Alert button
Picture for Shangyu Chen

Shangyu Chen

Alert button

Apollonion: Profile-centric Dialog Agent

Add code
Bookmark button
Alert button
Apr 10, 2024
Shangyu Chen, Zibo Zhao, Yuanyuan Zhao, Xiang Li

Viaarxiv icon

Adversarial Defense by Latent Style Transformations

Add code
Bookmark button
Alert button
Jun 17, 2020
Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen

Figure 1 for Adversarial Defense by Latent Style Transformations
Figure 2 for Adversarial Defense by Latent Style Transformations
Figure 3 for Adversarial Defense by Latent Style Transformations
Figure 4 for Adversarial Defense by Latent Style Transformations
Viaarxiv icon

Defending Adversarial Attacks via Semantic Feature Manipulation

Add code
Bookmark button
Alert button
Feb 03, 2020
Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen

Figure 1 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 2 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 3 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 4 for Defending Adversarial Attacks via Semantic Feature Manipulation
Viaarxiv icon

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning

Add code
Bookmark button
Alert button
Jan 18, 2020
Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler

Figure 1 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 2 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 3 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 4 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Viaarxiv icon

Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models

Add code
Bookmark button
Alert button
Jan 10, 2020
Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen

Figure 1 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 2 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 3 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 4 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Viaarxiv icon

Generating Semantic Adversarial Examples via Feature Manipulation

Add code
Bookmark button
Alert button
Jan 06, 2020
Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler

Figure 1 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 2 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 3 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 4 for Generating Semantic Adversarial Examples via Feature Manipulation
Viaarxiv icon

Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon

Add code
Bookmark button
Alert button
Nov 09, 2017
Xin Dong, Shangyu Chen, Sinno Jialin Pan

Figure 1 for Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
Figure 2 for Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
Figure 3 for Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
Figure 4 for Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
Viaarxiv icon