Picture for I-Hsin Chung

I-Hsin Chung

The infrastructure powering IBM's Gen AI model development

Add code
Jul 07, 2024
Figure 1 for The infrastructure powering IBM's Gen AI model development
Figure 2 for The infrastructure powering IBM's Gen AI model development
Figure 3 for The infrastructure powering IBM's Gen AI model development
Figure 4 for The infrastructure powering IBM's Gen AI model development
Viaarxiv icon

Data-Driven Lipschitz Continuity: A Cost-Effective Approach to Improve Adversarial Robustness

Add code
Jun 28, 2024
Figure 1 for Data-Driven Lipschitz Continuity: A Cost-Effective Approach to Improve Adversarial Robustness
Figure 2 for Data-Driven Lipschitz Continuity: A Cost-Effective Approach to Improve Adversarial Robustness
Figure 3 for Data-Driven Lipschitz Continuity: A Cost-Effective Approach to Improve Adversarial Robustness
Figure 4 for Data-Driven Lipschitz Continuity: A Cost-Effective Approach to Improve Adversarial Robustness
Viaarxiv icon

Steal Now and Attack Later: Evaluating Robustness of Object Detection against Black-box Adversarial Attacks

Add code
Apr 24, 2024
Figure 1 for Steal Now and Attack Later: Evaluating Robustness of Object Detection against Black-box Adversarial Attacks
Figure 2 for Steal Now and Attack Later: Evaluating Robustness of Object Detection against Black-box Adversarial Attacks
Figure 3 for Steal Now and Attack Later: Evaluating Robustness of Object Detection against Black-box Adversarial Attacks
Figure 4 for Steal Now and Attack Later: Evaluating Robustness of Object Detection against Black-box Adversarial Attacks
Viaarxiv icon

Overload: Latency Attacks on Object Detection for Edge Devices

Add code
Apr 12, 2023
Figure 1 for Overload: Latency Attacks on Object Detection for Edge Devices
Figure 2 for Overload: Latency Attacks on Object Detection for Edge Devices
Figure 3 for Overload: Latency Attacks on Object Detection for Edge Devices
Figure 4 for Overload: Latency Attacks on Object Detection for Edge Devices
Viaarxiv icon