Alert button
Picture for Jihun Hamm

Jihun Hamm

Alert button

On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization

Add code
Bookmark button
Alert button
Jul 17, 2023
Akshay Mehra, Yunbei Zhang, Bhavya Kailkhura, Jihun Hamm

Figure 1 for On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Figure 2 for On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Figure 3 for On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Figure 4 for On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Viaarxiv icon

Can Domain Adaptation Improve Accuracy and Fairness of Skin Lesion Classification?

Add code
Bookmark button
Alert button
Jul 06, 2023
Janet Wang, Yunbei Zhang, Zhengming Ding, Jihun Hamm

Figure 1 for Can Domain Adaptation Improve Accuracy and Fairness of Skin Lesion Classification?
Figure 2 for Can Domain Adaptation Improve Accuracy and Fairness of Skin Lesion Classification?
Figure 3 for Can Domain Adaptation Improve Accuracy and Fairness of Skin Lesion Classification?
Figure 4 for Can Domain Adaptation Improve Accuracy and Fairness of Skin Lesion Classification?
Viaarxiv icon

Analysis of Task Transferability in Large Pre-trained Classifiers

Add code
Bookmark button
Alert button
Jul 03, 2023
Akshay Mehra, Yunbei Zhang, Jihun Hamm

Figure 1 for Analysis of Task Transferability in Large Pre-trained Classifiers
Figure 2 for Analysis of Task Transferability in Large Pre-trained Classifiers
Figure 3 for Analysis of Task Transferability in Large Pre-trained Classifiers
Figure 4 for Analysis of Task Transferability in Large Pre-trained Classifiers
Viaarxiv icon

FBA-Net: Foreground and Background Aware Contrastive Learning for Semi-Supervised Atrium Segmentation

Add code
Bookmark button
Alert button
Jun 27, 2023
Yunsung Chung, Chanho Lim, Chao Huang, Nassir Marrouche, Jihun Hamm

Viaarxiv icon

On Certifying and Improving Generalization to Unseen Domains

Add code
Bookmark button
Alert button
Jun 24, 2022
Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

Figure 1 for On Certifying and Improving Generalization to Unseen Domains
Figure 2 for On Certifying and Improving Generalization to Unseen Domains
Figure 3 for On Certifying and Improving Generalization to Unseen Domains
Figure 4 for On Certifying and Improving Generalization to Unseen Domains
Viaarxiv icon

Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines

Add code
Bookmark button
Alert button
Dec 01, 2021
Jiachen Sun, Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Dan Hendrycks, Jihun Hamm, Z. Morley Mao

Figure 1 for Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Figure 2 for Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Figure 3 for Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Figure 4 for Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Viaarxiv icon

Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning

Add code
Bookmark button
Alert button
Jul 08, 2021
Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

Figure 1 for Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning
Figure 2 for Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning
Figure 3 for Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning
Figure 4 for Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning
Viaarxiv icon

Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks

Add code
Bookmark button
Alert button
Jun 15, 2021
Byunggill Joe, Akshay Mehra, Insik Shin, Jihun Hamm

Figure 1 for Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks
Figure 2 for Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks
Figure 3 for Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks
Figure 4 for Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks
Viaarxiv icon

Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection

Add code
Bookmark button
Alert button
Dec 07, 2020
Byunggill Joe, Jihun Hamm, Sung Ju Hwang, Sooel Son, Insik Shin

Figure 1 for Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection
Figure 2 for Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection
Figure 3 for Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection
Figure 4 for Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection
Viaarxiv icon

How Robust are Randomized Smoothing based Defenses to Data Poisoning?

Add code
Bookmark button
Alert button
Dec 02, 2020
Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

Figure 1 for How Robust are Randomized Smoothing based Defenses to Data Poisoning?
Figure 2 for How Robust are Randomized Smoothing based Defenses to Data Poisoning?
Figure 3 for How Robust are Randomized Smoothing based Defenses to Data Poisoning?
Figure 4 for How Robust are Randomized Smoothing based Defenses to Data Poisoning?
Viaarxiv icon