Picture for Renjue Li

Renjue Li

Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds

Add code
May 23, 2024
Viaarxiv icon

ADVREPAIR:Provable Repair of Adversarial Attack

Add code
Apr 02, 2024
Viaarxiv icon

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights

Add code
Oct 18, 2023
Viaarxiv icon

Safety Analysis of Autonomous Driving Systems Based on Model Learning

Add code
Nov 23, 2022
Viaarxiv icon

Towards Good Practices in Evaluating Transfer Adversarial Attacks

Add code
Nov 17, 2022
Viaarxiv icon

Ensemble Defense with Data Diversity: Weak Correlation Implies Strong Robustness

Add code
Jun 05, 2021
Figure 1 for Ensemble Defense with Data Diversity: Weak Correlation Implies Strong Robustness
Figure 2 for Ensemble Defense with Data Diversity: Weak Correlation Implies Strong Robustness
Figure 3 for Ensemble Defense with Data Diversity: Weak Correlation Implies Strong Robustness
Figure 4 for Ensemble Defense with Data Diversity: Weak Correlation Implies Strong Robustness
Viaarxiv icon

Probabilistic Robustness Analysis for DNNs based on PAC Learning

Add code
Jan 25, 2021
Figure 1 for Probabilistic Robustness Analysis for DNNs based on PAC Learning
Figure 2 for Probabilistic Robustness Analysis for DNNs based on PAC Learning
Figure 3 for Probabilistic Robustness Analysis for DNNs based on PAC Learning
Figure 4 for Probabilistic Robustness Analysis for DNNs based on PAC Learning
Viaarxiv icon

Improving Neural Network Verification through Spurious Region Guided Refinement

Add code
Oct 15, 2020
Figure 1 for Improving Neural Network Verification through Spurious Region Guided Refinement
Figure 2 for Improving Neural Network Verification through Spurious Region Guided Refinement
Figure 3 for Improving Neural Network Verification through Spurious Region Guided Refinement
Figure 4 for Improving Neural Network Verification through Spurious Region Guided Refinement
Viaarxiv icon