Alert button
Picture for Shiyu Chang

Shiyu Chang

Alert button

Can 3D Adversarial Logos Cloak Humans?

Add code
Bookmark button
Alert button
Jun 25, 2020
Tianlong Chen, Yi Wang, Jingyang Zhou, Sijia Liu, Shiyu Chang, Chandrajit Bajaj, Zhangyang Wang

Figure 1 for Can 3D Adversarial Logos Cloak Humans?
Figure 2 for Can 3D Adversarial Logos Cloak Humans?
Figure 3 for Can 3D Adversarial Logos Cloak Humans?
Figure 4 for Can 3D Adversarial Logos Cloak Humans?
Viaarxiv icon

Unsupervised Speech Decomposition via Triple Information Bottleneck

Add code
Bookmark button
Alert button
May 04, 2020
Kaizhi Qian, Yang Zhang, Shiyu Chang, David Cox, Mark Hasegawa-Johnson

Figure 1 for Unsupervised Speech Decomposition via Triple Information Bottleneck
Figure 2 for Unsupervised Speech Decomposition via Triple Information Bottleneck
Figure 3 for Unsupervised Speech Decomposition via Triple Information Bottleneck
Figure 4 for Unsupervised Speech Decomposition via Triple Information Bottleneck
Viaarxiv icon

Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games

Add code
Bookmark button
Alert button
Apr 06, 2020
Yufei Feng, Mo Yu, Wenhan Xiong, Xiaoxiao Guo, Junjie Huang, Shiyu Chang, Murray Campbell, Michael Greenspan, Xiaodan Zhu

Figure 1 for Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games
Figure 2 for Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games
Figure 3 for Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games
Figure 4 for Learning to Recover Reasoning Chains for Multi-Hop Question Answering via Cooperative Games
Viaarxiv icon

Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning

Add code
Bookmark button
Alert button
Mar 28, 2020
Tianlong Chen, Sijia Liu, Shiyu Chang, Yu Cheng, Lisa Amini, Zhangyang Wang

Figure 1 for Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning
Figure 2 for Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning
Figure 3 for Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning
Figure 4 for Adversarial Robustness: From Self-Supervised Pre-Training to Fine-Tuning
Viaarxiv icon

Invariant Rationalization

Add code
Bookmark button
Alert button
Mar 22, 2020
Shiyu Chang, Yang Zhang, Mo Yu, Tommi S. Jaakkola

Figure 1 for Invariant Rationalization
Figure 2 for Invariant Rationalization
Figure 3 for Invariant Rationalization
Figure 4 for Invariant Rationalization
Viaarxiv icon

Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control

Add code
Bookmark button
Alert button
Oct 29, 2019
Mo Yu, Shiyu Chang, Yang Zhang, Tommi S. Jaakkola

Figure 1 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 2 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 3 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Figure 4 for Rethinking Cooperative Rationalization: Introspective Extraction and Complement Control
Viaarxiv icon

A Game Theoretic Approach to Class-wise Selective Rationalization

Add code
Bookmark button
Alert button
Oct 28, 2019
Shiyu Chang, Yang Zhang, Mo Yu, Tommi S. Jaakkola

Figure 1 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 2 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 3 for A Game Theoretic Approach to Class-wise Selective Rationalization
Figure 4 for A Game Theoretic Approach to Class-wise Selective Rationalization
Viaarxiv icon

An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack

Add code
Bookmark button
Alert button
Oct 01, 2019
Yang Zhang, Shiyu Chang, Mo Yu, Kaizhi Qian

Figure 1 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 2 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 3 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Figure 4 for An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack
Viaarxiv icon