Alert button
Picture for Shuyu Cheng

Shuyu Cheng

Alert button

Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

Mar 13, 2022
Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu

Figure 1 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 2 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 3 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 4 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Viaarxiv icon

On the Convergence of Prior-Guided Zeroth-Order Optimization Algorithms

Jul 21, 2021
Shuyu Cheng, Guoqiang Wu, Jun Zhu

Figure 1 for On the Convergence of Prior-Guided Zeroth-Order Optimization Algorithms
Figure 2 for On the Convergence of Prior-Guided Zeroth-Order Optimization Algorithms
Figure 3 for On the Convergence of Prior-Guided Zeroth-Order Optimization Algorithms
Viaarxiv icon

Switching Gradient Directions for Query-Efficient Black-Box Adversarial Attacks

Sep 15, 2020
Chen Ma, Shuyu Cheng, Li Chen, Junhai Yong

Figure 1 for Switching Gradient Directions for Query-Efficient Black-Box Adversarial Attacks
Figure 2 for Switching Gradient Directions for Query-Efficient Black-Box Adversarial Attacks
Figure 3 for Switching Gradient Directions for Query-Efficient Black-Box Adversarial Attacks
Figure 4 for Switching Gradient Directions for Query-Efficient Black-Box Adversarial Attacks
Viaarxiv icon

A Wasserstein Minimum Velocity Approach to Learning Unnormalized Models

Feb 18, 2020
Ziyu Wang, Shuyu Cheng, Yueru Li, Jun Zhu, Bo Zhang

Figure 1 for A Wasserstein Minimum Velocity Approach to Learning Unnormalized Models
Figure 2 for A Wasserstein Minimum Velocity Approach to Learning Unnormalized Models
Figure 3 for A Wasserstein Minimum Velocity Approach to Learning Unnormalized Models
Figure 4 for A Wasserstein Minimum Velocity Approach to Learning Unnormalized Models
Viaarxiv icon

Improving Black-box Adversarial Attacks with a Transfer-based Prior

Jun 17, 2019
Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu

Figure 1 for Improving Black-box Adversarial Attacks with a Transfer-based Prior
Figure 2 for Improving Black-box Adversarial Attacks with a Transfer-based Prior
Figure 3 for Improving Black-box Adversarial Attacks with a Transfer-based Prior
Figure 4 for Improving Black-box Adversarial Attacks with a Transfer-based Prior
Viaarxiv icon