Picture for Sijia Liu

Sijia Liu

N3C Natural Language Processing

Linearity Grafting: Relaxed Neuron Pruning Helps Certifiable Robustness

Add code
Jun 15, 2022
Figure 1 for Linearity Grafting: Relaxed Neuron Pruning Helps Certifiable Robustness
Figure 2 for Linearity Grafting: Relaxed Neuron Pruning Helps Certifiable Robustness
Figure 3 for Linearity Grafting: Relaxed Neuron Pruning Helps Certifiable Robustness
Figure 4 for Linearity Grafting: Relaxed Neuron Pruning Helps Certifiable Robustness
Viaarxiv icon

Distributed Adversarial Training to Robustify Deep Neural Networks at Scale

Add code
Jun 13, 2022
Figure 1 for Distributed Adversarial Training to Robustify Deep Neural Networks at Scale
Figure 2 for Distributed Adversarial Training to Robustify Deep Neural Networks at Scale
Figure 3 for Distributed Adversarial Training to Robustify Deep Neural Networks at Scale
Figure 4 for Distributed Adversarial Training to Robustify Deep Neural Networks at Scale
Viaarxiv icon

Data-Efficient Double-Win Lottery Tickets from Robust Pre-training

Add code
Jun 09, 2022
Figure 1 for Data-Efficient Double-Win Lottery Tickets from Robust Pre-training
Figure 2 for Data-Efficient Double-Win Lottery Tickets from Robust Pre-training
Figure 3 for Data-Efficient Double-Win Lottery Tickets from Robust Pre-training
Figure 4 for Data-Efficient Double-Win Lottery Tickets from Robust Pre-training
Viaarxiv icon

Zeroth-Order SciML: Non-intrusive Integration of Scientific Software with Deep Learning

Add code
Jun 04, 2022
Figure 1 for Zeroth-Order SciML: Non-intrusive Integration of Scientific Software with Deep Learning
Figure 2 for Zeroth-Order SciML: Non-intrusive Integration of Scientific Software with Deep Learning
Figure 3 for Zeroth-Order SciML: Non-intrusive Integration of Scientific Software with Deep Learning
Viaarxiv icon

Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free

Add code
May 24, 2022
Figure 1 for Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Figure 2 for Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Figure 3 for Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Figure 4 for Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Viaarxiv icon

A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction

Add code
May 11, 2022
Figure 1 for A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction
Figure 2 for A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction
Figure 3 for A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction
Figure 4 for A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction
Viaarxiv icon

CryoRL: Reinforcement Learning Enables Efficient Cryo-EM Data Collection

Add code
Apr 15, 2022
Figure 1 for CryoRL: Reinforcement Learning Enables Efficient Cryo-EM Data Collection
Figure 2 for CryoRL: Reinforcement Learning Enables Efficient Cryo-EM Data Collection
Figure 3 for CryoRL: Reinforcement Learning Enables Efficient Cryo-EM Data Collection
Figure 4 for CryoRL: Reinforcement Learning Enables Efficient Cryo-EM Data Collection
Viaarxiv icon

Reverse Engineering of Imperceptible Adversarial Image Perturbations

Add code
Apr 01, 2022
Figure 1 for Reverse Engineering of Imperceptible Adversarial Image Perturbations
Figure 2 for Reverse Engineering of Imperceptible Adversarial Image Perturbations
Figure 3 for Reverse Engineering of Imperceptible Adversarial Image Perturbations
Figure 4 for Reverse Engineering of Imperceptible Adversarial Image Perturbations
Viaarxiv icon

Proactive Image Manipulation Detection

Add code
Mar 31, 2022
Figure 1 for Proactive Image Manipulation Detection
Figure 2 for Proactive Image Manipulation Detection
Figure 3 for Proactive Image Manipulation Detection
Figure 4 for Proactive Image Manipulation Detection
Viaarxiv icon

How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective

Add code
Mar 27, 2022
Figure 1 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 2 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 3 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 4 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Viaarxiv icon