Get our free extension to see links to code for papers anywhere online!

Chrome logo  Add to Chrome

Firefox logo Add to Firefox

Defending Adversarial Examples by Negative Correlation Ensemble



Wenjian Luo , Hongwei Zhang , Linghao Kong , Zhijian Chen , Ke Tang


   Access Paper or Ask Questions

Saliency Attack: Towards Imperceptible Black-box Adversarial Attack



Zeyu Dai , Shengcai Liu , Ke Tang , Qing Li


   Access Paper or Ask Questions

Near-Optimal Trajectory Design and Restoration Areas Allocation for UAV-Enabled Grassland Restoration



Dongbin Jiaoa , Lingyu Wanga , Peng Yang , Weibo Yang , Yu Peng , Zhanhuan Shang , Ke Tang , Fengyuan Ren


   Access Paper or Ask Questions

Training Quantized Deep Neural Networks via Cooperative Coevolution



Fu Peng , Shengcai Liu , Ke Tang


   Access Paper or Ask Questions

HydraText: Multi-objective Optimization for Adversarial Textual Attack



Shengcai Liu , Ning Lu , Cheng Chen , Chao Qian , Ke Tang


   Access Paper or Ask Questions

Efficient Combinatorial Optimization for Word-level Adversarial Textual Attack



Shengcai Liu , Ning Lu , Cheng Chen , Ke Tang


   Access Paper or Ask Questions

Deep Sequence Modeling: Development and Applications in Asset Pricing



Lin William Cong , Ke Tang , Jingyuan Wang , Yang Zhang


   Access Paper or Ask Questions

Active Reinforcement Learning over MDPs



Qi Yang , Peng Yang , Ke Tang

* In this version, we ignored a prior related work as our baseline, and need to update corresponding reviews and experiments in next version 

   Access Paper or Ask Questions

Multi-Domain Active Learning: A Comparative Study



Rui He , Shan He , Ke Tang


   Access Paper or Ask Questions

1
2
3
4
5
6
>>