Alert button
Picture for Jianbo Chen

Jianbo Chen

Alert button

QuTE: decentralized multiple testing on sensor networks with false discovery rate control

Add code
Bookmark button
Alert button
Oct 09, 2022
Aaditya Ramdas, Jianbo Chen, Martin J. Wainwright, Michael I. Jordan

Figure 1 for QuTE: decentralized multiple testing on sensor networks with false discovery rate control
Figure 2 for QuTE: decentralized multiple testing on sensor networks with false discovery rate control
Figure 3 for QuTE: decentralized multiple testing on sensor networks with false discovery rate control
Figure 4 for QuTE: decentralized multiple testing on sensor networks with false discovery rate control
Viaarxiv icon

A Transformer-based deep neural network model for SSVEP classification

Add code
Bookmark button
Alert button
Oct 09, 2022
Jianbo Chen, Yangsong Zhang, Yudong Pan, Peng Xu, Cuntai Guan

Figure 1 for A Transformer-based deep neural network model for SSVEP classification
Figure 2 for A Transformer-based deep neural network model for SSVEP classification
Figure 3 for A Transformer-based deep neural network model for SSVEP classification
Figure 4 for A Transformer-based deep neural network model for SSVEP classification
Viaarxiv icon

ML-LOO: Detecting Adversarial Examples with Feature Attribution

Add code
Bookmark button
Alert button
Jun 08, 2019
Puyudi Yang, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, Michael I. Jordan

Figure 1 for ML-LOO: Detecting Adversarial Examples with Feature Attribution
Figure 2 for ML-LOO: Detecting Adversarial Examples with Feature Attribution
Figure 3 for ML-LOO: Detecting Adversarial Examples with Feature Attribution
Figure 4 for ML-LOO: Detecting Adversarial Examples with Feature Attribution
Viaarxiv icon

Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack

Add code
Bookmark button
Alert button
Apr 03, 2019
Jianbo Chen, Michael I. Jordan

Figure 1 for Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack
Figure 2 for Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack
Figure 3 for Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack
Figure 4 for Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack
Viaarxiv icon

LS-Tree: Model Interpretation When the Data Are Linguistic

Add code
Bookmark button
Alert button
Feb 11, 2019
Jianbo Chen, Michael I. Jordan

Figure 1 for LS-Tree: Model Interpretation When the Data Are Linguistic
Figure 2 for LS-Tree: Model Interpretation When the Data Are Linguistic
Figure 3 for LS-Tree: Model Interpretation When the Data Are Linguistic
Figure 4 for LS-Tree: Model Interpretation When the Data Are Linguistic
Viaarxiv icon

Kernel Feature Selection via Conditional Covariance Minimization

Add code
Bookmark button
Alert button
Oct 20, 2018
Jianbo Chen, Mitchell Stern, Martin J. Wainwright, Michael I. Jordan

Figure 1 for Kernel Feature Selection via Conditional Covariance Minimization
Figure 2 for Kernel Feature Selection via Conditional Covariance Minimization
Figure 3 for Kernel Feature Selection via Conditional Covariance Minimization
Viaarxiv icon

L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data

Add code
Bookmark button
Alert button
Aug 08, 2018
Jianbo Chen, Le Song, Martin J. Wainwright, Michael I. Jordan

Figure 1 for L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data
Figure 2 for L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data
Figure 3 for L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data
Figure 4 for L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data
Viaarxiv icon

Learning to Explain: An Information-Theoretic Perspective on Model Interpretation

Add code
Bookmark button
Alert button
Jun 14, 2018
Jianbo Chen, Le Song, Martin J. Wainwright, Michael I. Jordan

Figure 1 for Learning to Explain: An Information-Theoretic Perspective on Model Interpretation
Figure 2 for Learning to Explain: An Information-Theoretic Perspective on Model Interpretation
Figure 3 for Learning to Explain: An Information-Theoretic Perspective on Model Interpretation
Figure 4 for Learning to Explain: An Information-Theoretic Perspective on Model Interpretation
Viaarxiv icon

Language-Based Image Editing with Recurrent Attentive Models

Add code
Bookmark button
Alert button
Jun 10, 2018
Jianbo Chen, Yelong Shen, Jianfeng Gao, Jingjing Liu, Xiaodong Liu

Figure 1 for Language-Based Image Editing with Recurrent Attentive Models
Figure 2 for Language-Based Image Editing with Recurrent Attentive Models
Figure 3 for Language-Based Image Editing with Recurrent Attentive Models
Figure 4 for Language-Based Image Editing with Recurrent Attentive Models
Viaarxiv icon

Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data

Add code
Bookmark button
Alert button
May 31, 2018
Puyudi Yang, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, Michael I. Jordan

Figure 1 for Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Figure 2 for Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Figure 3 for Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Figure 4 for Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Viaarxiv icon