Alert button
Picture for Jinfeng Yi

Jinfeng Yi

Alert button

Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach

Add code
Bookmark button
Alert button
Jul 12, 2018
Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh

Figure 1 for Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Figure 2 for Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Figure 3 for Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Figure 4 for Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Viaarxiv icon

Matrix Completion from Non-Uniformly Sampled Entries

Add code
Bookmark button
Alert button
Jun 27, 2018
Yuanyu Wan, Jinfeng Yi, Lijun Zhang

Figure 1 for Matrix Completion from Non-Uniformly Sampled Entries
Figure 2 for Matrix Completion from Non-Uniformly Sampled Entries
Viaarxiv icon

Self-weighted Multiple Kernel Learning for Graph-based Clustering and Semi-supervised Classification

Add code
Bookmark button
Alert button
Jun 20, 2018
Zhao Kang, Xiao Lu, Jinfeng Yi, Zenglin Xu

Figure 1 for Self-weighted Multiple Kernel Learning for Graph-based Clustering and Semi-supervised Classification
Figure 2 for Self-weighted Multiple Kernel Learning for Graph-based Clustering and Semi-supervised Classification
Figure 3 for Self-weighted Multiple Kernel Learning for Graph-based Clustering and Semi-supervised Classification
Figure 4 for Self-weighted Multiple Kernel Learning for Graph-based Clustering and Semi-supervised Classification
Viaarxiv icon

Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning

Add code
Bookmark button
Alert button
May 22, 2018
Hongge Chen, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Cho-Jui Hsieh

Figure 1 for Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning
Viaarxiv icon

Edge Attention-based Multi-Relational Graph Convolutional Networks

Add code
Bookmark button
Alert button
May 20, 2018
Chao Shang, Qinqing Liu, Ko-Shin Chen, Jiangwen Sun, Jin Lu, Jinfeng Yi, Jinbo Bi

Figure 1 for Edge Attention-based Multi-Relational Graph Convolutional Networks
Figure 2 for Edge Attention-based Multi-Relational Graph Convolutional Networks
Figure 3 for Edge Attention-based Multi-Relational Graph Convolutional Networks
Figure 4 for Edge Attention-based Multi-Relational Graph Convolutional Networks
Viaarxiv icon

Diverse Few-Shot Text Classification with Multiple Metrics

Add code
Bookmark button
Alert button
May 19, 2018
Mo Yu, Xiaoxiao Guo, Jinfeng Yi, Shiyu Chang, Saloni Potdar, Yu Cheng, Gerald Tesauro, Haoyu Wang, Bowen Zhou

Figure 1 for Diverse Few-Shot Text Classification with Multiple Metrics
Figure 2 for Diverse Few-Shot Text Classification with Multiple Metrics
Figure 3 for Diverse Few-Shot Text Classification with Multiple Metrics
Figure 4 for Diverse Few-Shot Text Classification with Multiple Metrics
Viaarxiv icon

Robust Task Clustering for Deep Many-Task Learning

Add code
Bookmark button
Alert button
May 18, 2018
Mo Yu, Xiaoxiao Guo, Jinfeng Yi, Shiyu Chang, Saloni Potdar, Gerald Tesauro, Haoyu Wang, Bowen Zhou

Figure 1 for Robust Task Clustering for Deep Many-Task Learning
Figure 2 for Robust Task Clustering for Deep Many-Task Learning
Figure 3 for Robust Task Clustering for Deep Many-Task Learning
Figure 4 for Robust Task Clustering for Deep Many-Task Learning
Viaarxiv icon

Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples

Add code
Bookmark button
Alert button
Mar 03, 2018
Minhao Cheng, Jinfeng Yi, Huan Zhang, Pin-Yu Chen, Cho-Jui Hsieh

Figure 1 for Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples
Figure 2 for Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples
Figure 3 for Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples
Figure 4 for Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples
Viaarxiv icon

Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models

Add code
Bookmark button
Alert button
Feb 13, 2018
Mengying Sun, Fengyi Tang, Jinfeng Yi, Fei Wang, Jiayu Zhou

Figure 1 for Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Figure 2 for Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Figure 3 for Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Figure 4 for Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Viaarxiv icon

EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples

Add code
Bookmark button
Alert button
Feb 10, 2018
Pin-Yu Chen, Yash Sharma, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh

Figure 1 for EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Figure 2 for EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Figure 3 for EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Figure 4 for EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Viaarxiv icon