Picture for Liyao Xiang

Liyao Xiang

A Distributional Robustness Certificate by Randomized Smoothing

Add code
Oct 21, 2020
Figure 1 for A Distributional Robustness Certificate by Randomized Smoothing
Figure 2 for A Distributional Robustness Certificate by Randomized Smoothing
Figure 3 for A Distributional Robustness Certificate by Randomized Smoothing
Figure 4 for A Distributional Robustness Certificate by Randomized Smoothing
Viaarxiv icon

High-Order Relation Construction and Mining for Graph Matching

Add code
Oct 09, 2020
Figure 1 for High-Order Relation Construction and Mining for Graph Matching
Figure 2 for High-Order Relation Construction and Mining for Graph Matching
Figure 3 for High-Order Relation Construction and Mining for Graph Matching
Figure 4 for High-Order Relation Construction and Mining for Graph Matching
Viaarxiv icon

Achieving Adversarial Robustness via Sparsity

Add code
Sep 11, 2020
Figure 1 for Achieving Adversarial Robustness via Sparsity
Figure 2 for Achieving Adversarial Robustness via Sparsity
Figure 3 for Achieving Adversarial Robustness via Sparsity
Figure 4 for Achieving Adversarial Robustness via Sparsity
Viaarxiv icon

Rotation-Equivariant Neural Networks for Privacy Protection

Add code
Jun 21, 2020
Figure 1 for Rotation-Equivariant Neural Networks for Privacy Protection
Figure 2 for Rotation-Equivariant Neural Networks for Privacy Protection
Figure 3 for Rotation-Equivariant Neural Networks for Privacy Protection
Figure 4 for Rotation-Equivariant Neural Networks for Privacy Protection
Viaarxiv icon

Deep Quaternion Features for Privacy Protection

Add code
Mar 18, 2020
Figure 1 for Deep Quaternion Features for Privacy Protection
Figure 2 for Deep Quaternion Features for Privacy Protection
Figure 3 for Deep Quaternion Features for Privacy Protection
Figure 4 for Deep Quaternion Features for Privacy Protection
Viaarxiv icon

Preventing Information Leakage with Neural Architecture Search

Add code
Dec 18, 2019
Figure 1 for Preventing Information Leakage with Neural Architecture Search
Figure 2 for Preventing Information Leakage with Neural Architecture Search
Figure 3 for Preventing Information Leakage with Neural Architecture Search
Figure 4 for Preventing Information Leakage with Neural Architecture Search
Viaarxiv icon

Complex-Valued Neural Networks for Privacy Protection

Add code
Jan 28, 2019
Figure 1 for Complex-Valued Neural Networks for Privacy Protection
Figure 2 for Complex-Valued Neural Networks for Privacy Protection
Figure 3 for Complex-Valued Neural Networks for Privacy Protection
Figure 4 for Complex-Valued Neural Networks for Privacy Protection
Viaarxiv icon