Picture for Shouling Ji

Shouling Ji

GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction

Add code
Feb 21, 2022
Figure 1 for GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction
Figure 2 for GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction
Figure 3 for GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction
Figure 4 for GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction
Viaarxiv icon

Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction

Add code
Dec 30, 2021
Figure 1 for Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction
Figure 2 for Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction
Figure 3 for Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction
Figure 4 for Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction
Viaarxiv icon

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification

Add code
Dec 25, 2021
Figure 1 for NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification
Figure 2 for NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification
Figure 3 for NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification
Figure 4 for NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification
Viaarxiv icon

NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks

Add code
Dec 24, 2021
Figure 1 for NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks
Figure 2 for NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks
Figure 3 for NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks
Figure 4 for NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks
Viaarxiv icon

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art

Add code
Dec 23, 2021
Figure 1 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 2 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 3 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 4 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Viaarxiv icon

Backdoor Pre-trained Models Can Transfer to All

Add code
Oct 30, 2021
Figure 1 for Backdoor Pre-trained Models Can Transfer to All
Figure 2 for Backdoor Pre-trained Models Can Transfer to All
Figure 3 for Backdoor Pre-trained Models Can Transfer to All
Figure 4 for Backdoor Pre-trained Models Can Transfer to All
Viaarxiv icon

On the Security Risks of AutoML

Add code
Oct 12, 2021
Figure 1 for On the Security Risks of AutoML
Figure 2 for On the Security Risks of AutoML
Figure 3 for On the Security Risks of AutoML
Figure 4 for On the Security Risks of AutoML
Viaarxiv icon

GGT: Graph-Guided Testing for Adversarial Sample Detection of Deep Neural Network

Add code
Jul 09, 2021
Figure 1 for GGT: Graph-Guided Testing for Adversarial Sample Detection of Deep Neural Network
Figure 2 for GGT: Graph-Guided Testing for Adversarial Sample Detection of Deep Neural Network
Figure 3 for GGT: Graph-Guided Testing for Adversarial Sample Detection of Deep Neural Network
Figure 4 for GGT: Graph-Guided Testing for Adversarial Sample Detection of Deep Neural Network
Viaarxiv icon

Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion

Add code
Jun 17, 2021
Figure 1 for Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion
Figure 2 for Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion
Figure 3 for Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion
Figure 4 for Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion
Viaarxiv icon

EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild

Add code
Apr 20, 2021
Figure 1 for EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild
Figure 2 for EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild
Figure 3 for EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild
Figure 4 for EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild
Viaarxiv icon