Picture for Jinfeng Yi

Jinfeng Yi

How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning

Add code
Apr 24, 2019
Figure 1 for How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning
Figure 2 for How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning
Figure 3 for How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning
Figure 4 for How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning
Viaarxiv icon

A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks

Add code
Nov 27, 2018
Figure 1 for A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
Figure 2 for A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
Figure 3 for A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
Figure 4 for A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks
Viaarxiv icon

Random Warping Series: A Random Features Method for Time-Series Embedding

Add code
Sep 14, 2018
Figure 1 for Random Warping Series: A Random Features Method for Time-Series Embedding
Figure 2 for Random Warping Series: A Random Features Method for Time-Series Embedding
Figure 3 for Random Warping Series: A Random Features Method for Time-Series Embedding
Figure 4 for Random Warping Series: A Random Features Method for Time-Series Embedding
Viaarxiv icon

Query-Efficient Black-Box Attack by Active Learning

Add code
Sep 13, 2018
Figure 1 for Query-Efficient Black-Box Attack by Active Learning
Figure 2 for Query-Efficient Black-Box Attack by Active Learning
Figure 3 for Query-Efficient Black-Box Attack by Active Learning
Viaarxiv icon

Towards Query Efficient Black-box Attacks: An Input-free Perspective

Add code
Sep 09, 2018
Figure 1 for Towards Query Efficient Black-box Attacks: An Input-free Perspective
Figure 2 for Towards Query Efficient Black-box Attacks: An Input-free Perspective
Figure 3 for Towards Query Efficient Black-box Attacks: An Input-free Perspective
Figure 4 for Towards Query Efficient Black-box Attacks: An Input-free Perspective
Viaarxiv icon

AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks

Add code
Sep 06, 2018
Figure 1 for AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Figure 2 for AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Figure 3 for AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Figure 4 for AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
Viaarxiv icon

Universal Stagewise Learning for Non-Convex Problems with Convergence on Averaged Solutions

Add code
Sep 04, 2018
Viaarxiv icon

Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models

Add code
Aug 05, 2018
Figure 1 for Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
Figure 2 for Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
Figure 3 for Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
Figure 4 for Is Robustness the Cost of Accuracy? -- A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
Viaarxiv icon

Defend Deep Neural Networks Against Adversarial Examples via Fixed andDynamic Quantized Activation Functions

Add code
Jul 18, 2018
Figure 1 for Defend Deep Neural Networks Against Adversarial Examples via Fixed andDynamic Quantized Activation Functions
Figure 2 for Defend Deep Neural Networks Against Adversarial Examples via Fixed andDynamic Quantized Activation Functions
Figure 3 for Defend Deep Neural Networks Against Adversarial Examples via Fixed andDynamic Quantized Activation Functions
Figure 4 for Defend Deep Neural Networks Against Adversarial Examples via Fixed andDynamic Quantized Activation Functions
Viaarxiv icon

Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach

Add code
Jul 12, 2018
Figure 1 for Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Figure 2 for Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Figure 3 for Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Figure 4 for Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Viaarxiv icon