Alert button
Picture for Jinfeng Yi

Jinfeng Yi

Alert button

Efficient Algorithms for Generalized Linear Bandits with Heavy-tailed Rewards

Add code
Bookmark button
Alert button
Oct 28, 2023
Bo Xue, Yimu Wang, Yuanyu Wan, Jinfeng Yi, Lijun Zhang

Figure 1 for Efficient Algorithms for Generalized Linear Bandits with Heavy-tailed Rewards
Figure 2 for Efficient Algorithms for Generalized Linear Bandits with Heavy-tailed Rewards
Figure 3 for Efficient Algorithms for Generalized Linear Bandits with Heavy-tailed Rewards
Viaarxiv icon

Smoothed Online Convex Optimization Based on Discounted-Normal-Predictor

Add code
Bookmark button
Alert button
May 02, 2022
Lijun Zhang, Wei Jiang, Jinfeng Yi, Tianbao Yang

Viaarxiv icon

How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective

Add code
Bookmark button
Alert button
Mar 27, 2022
Yimeng Zhang, Yuguang Yao, Jinghan Jia, Jinfeng Yi, Mingyi Hong, Shiyu Chang, Sijia Liu

Figure 1 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 2 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 3 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 4 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Viaarxiv icon

Can Adversarial Training Be Manipulated By Non-Robust Features?

Add code
Bookmark button
Alert button
Jan 31, 2022
Lue Tao, Lei Feng, Hongxin Wei, Jinfeng Yi, Sheng-Jun Huang, Songcan Chen

Figure 1 for Can Adversarial Training Be Manipulated By Non-Robust Features?
Figure 2 for Can Adversarial Training Be Manipulated By Non-Robust Features?
Figure 3 for Can Adversarial Training Be Manipulated By Non-Robust Features?
Figure 4 for Can Adversarial Training Be Manipulated By Non-Robust Features?
Viaarxiv icon

On the Convergence and Robustness of Adversarial Training

Add code
Bookmark button
Alert button
Dec 15, 2021
Yisen Wang, Xingjun Ma, James Bailey, Jinfeng Yi, Bowen Zhou, Quanquan Gu

Figure 1 for On the Convergence and Robustness of Adversarial Training
Figure 2 for On the Convergence and Robustness of Adversarial Training
Figure 3 for On the Convergence and Robustness of Adversarial Training
Figure 4 for On the Convergence and Robustness of Adversarial Training
Viaarxiv icon

Federated Two-stage Learning with Sign-based Voting

Add code
Bookmark button
Alert button
Dec 10, 2021
Zichen Ma, Zihan Lu, Yu Lu, Wenye Li, Jinfeng Yi, Shuguang Cui

Figure 1 for Federated Two-stage Learning with Sign-based Voting
Figure 2 for Federated Two-stage Learning with Sign-based Voting
Figure 3 for Federated Two-stage Learning with Sign-based Voting
Figure 4 for Federated Two-stage Learning with Sign-based Voting
Viaarxiv icon

How and When Adversarial Robustness Transfers in Knowledge Distillation?

Add code
Bookmark button
Alert button
Oct 22, 2021
Rulin Shao, Jinfeng Yi, Pin-Yu Chen, Cho-Jui Hsieh

Figure 1 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 2 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 3 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 4 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Viaarxiv icon

Adversarial Attack across Datasets

Add code
Bookmark button
Alert button
Oct 13, 2021
Yunxiao Qin, Yuanhao Xiong, Jinfeng Yi, Cho-Jui Hsieh

Figure 1 for Adversarial Attack across Datasets
Figure 2 for Adversarial Attack across Datasets
Figure 3 for Adversarial Attack across Datasets
Figure 4 for Adversarial Attack across Datasets
Viaarxiv icon

Trustworthy AI: From Principles to Practices

Add code
Bookmark button
Alert button
Oct 04, 2021
Bo Li, Peng Qi, Bo Liu, Shuai Di, Jingen Liu, Jiquan Pei, Jinfeng Yi, Bowen Zhou

Figure 1 for Trustworthy AI: From Principles to Practices
Figure 2 for Trustworthy AI: From Principles to Practices
Figure 3 for Trustworthy AI: From Principles to Practices
Figure 4 for Trustworthy AI: From Principles to Practices
Viaarxiv icon

Training Meta-Surrogate Model for Transferable Adversarial Attack

Add code
Bookmark button
Alert button
Sep 07, 2021
Yunxiao Qin, Yuanhao Xiong, Jinfeng Yi, Cho-Jui Hsieh

Figure 1 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 2 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 3 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 4 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Viaarxiv icon