Alert button
Picture for Juan Zhai

Juan Zhai

Alert button

Machine Translation Testing via Syntactic Tree Pruning

Add code
Bookmark button
Alert button
Jan 01, 2024
Quanjun Zhang, Juan Zhai, Chunrong Fang, Jiawei Liu, Weisong Sun, Haichuan Hu, Qingyu Wang

Viaarxiv icon

DREAM: Debugging and Repairing AutoML Pipelines

Add code
Bookmark button
Alert button
Dec 31, 2023
Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen

Viaarxiv icon

CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement

Add code
Bookmark button
Alert button
Apr 09, 2023
Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang

Figure 1 for CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Figure 2 for CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Figure 3 for CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Figure 4 for CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Viaarxiv icon

UNICORN: A Unified Backdoor Trigger Inversion Framework

Add code
Bookmark button
Alert button
Apr 05, 2023
Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma

Figure 1 for UNICORN: A Unified Backdoor Trigger Inversion Framework
Figure 2 for UNICORN: A Unified Backdoor Trigger Inversion Framework
Figure 3 for UNICORN: A Unified Backdoor Trigger Inversion Framework
Figure 4 for UNICORN: A Unified Backdoor Trigger Inversion Framework
Viaarxiv icon

Rethinking the Reverse-engineering of Trojan Triggers

Add code
Bookmark button
Alert button
Oct 27, 2022
Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma

Figure 1 for Rethinking the Reverse-engineering of Trojan Triggers
Figure 2 for Rethinking the Reverse-engineering of Trojan Triggers
Figure 3 for Rethinking the Reverse-engineering of Trojan Triggers
Figure 4 for Rethinking the Reverse-engineering of Trojan Triggers
Viaarxiv icon

BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning

Add code
Bookmark button
Alert button
May 26, 2022
Zhenting Wang, Juan Zhai, Shiqing Ma

Figure 1 for BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Figure 2 for BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Figure 3 for BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Figure 4 for BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Viaarxiv icon

FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons

Add code
Bookmark button
Alert button
Apr 06, 2022
Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang

Figure 1 for FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons
Figure 2 for FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons
Figure 3 for FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons
Figure 4 for FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons
Viaarxiv icon

Neural Network Trojans Analysis and Mitigation from the Input Domain

Add code
Bookmark button
Alert button
Feb 16, 2022
Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma

Figure 1 for Neural Network Trojans Analysis and Mitigation from the Input Domain
Figure 2 for Neural Network Trojans Analysis and Mitigation from the Input Domain
Figure 3 for Neural Network Trojans Analysis and Mitigation from the Input Domain
Figure 4 for Neural Network Trojans Analysis and Mitigation from the Input Domain
Viaarxiv icon