Alert button
Picture for Sijia Liu

Sijia Liu

Alert button

ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense

Add code
Bookmark button
Alert button
Jun 27, 2021
Ren Wang, Tianqi Chen, Philip Yao, Sijia Liu, Indika Rajapakse, Alfred Hero

Figure 1 for ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense
Figure 2 for ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense
Figure 3 for ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense
Figure 4 for ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense
Viaarxiv icon

A Compression-Compilation Framework for On-mobile Real-time BERT Applications

Add code
Bookmark button
Alert button
Jun 06, 2021
Wei Niu, Zhenglun Kong, Geng Yuan, Weiwen Jiang, Jiexiong Guan, Caiwen Ding, Pu Zhao, Sijia Liu, Bin Ren, Yanzhi Wang

Figure 1 for A Compression-Compilation Framework for On-mobile Real-time BERT Applications
Figure 2 for A Compression-Compilation Framework for On-mobile Real-time BERT Applications
Figure 3 for A Compression-Compilation Framework for On-mobile Real-time BERT Applications
Figure 4 for A Compression-Compilation Framework for On-mobile Real-time BERT Applications
Viaarxiv icon

Preserving Earlier Knowledge in Continual Learning with the Help of All Previous Feature Extractors

Add code
Bookmark button
Alert button
Apr 28, 2021
Zhuoyun Li, Changhong Zhong, Sijia Liu, Ruixuan Wang, Wei-Shi Zheng

Figure 1 for Preserving Earlier Knowledge in Continual Learning with the Help of All Previous Feature Extractors
Figure 2 for Preserving Earlier Knowledge in Continual Learning with the Help of All Previous Feature Extractors
Figure 3 for Preserving Earlier Knowledge in Continual Learning with the Help of All Previous Feature Extractors
Figure 4 for Preserving Earlier Knowledge in Continual Learning with the Help of All Previous Feature Extractors
Viaarxiv icon

Preserve, Promote, or Attack? GNN Explanation via Topology Perturbation

Add code
Bookmark button
Alert button
Mar 25, 2021
Yi Sun, Abel Valente, Sijia Liu, Dakuo Wang

Figure 1 for Preserve, Promote, or Attack? GNN Explanation via Topology Perturbation
Figure 2 for Preserve, Promote, or Attack? GNN Explanation via Topology Perturbation
Figure 3 for Preserve, Promote, or Attack? GNN Explanation via Topology Perturbation
Figure 4 for Preserve, Promote, or Attack? GNN Explanation via Topology Perturbation
Viaarxiv icon

Generating Adversarial Computer Programs using Optimized Obfuscations

Add code
Bookmark button
Alert button
Mar 18, 2021
Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shiyu Chang, Quanfu Fan, Gaoyuan Zhang, Una-May O'Reilly

Figure 1 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 2 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 3 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 4 for Generating Adversarial Computer Programs using Optimized Obfuscations
Viaarxiv icon

On Instabilities of Conventional Multi-Coil MRI Reconstruction to Small Adverserial Perturbations

Add code
Bookmark button
Alert button
Feb 25, 2021
Chi Zhang, Jinghan Jia, Burhaneddin Yaman, Steen Moeller, Sijia Liu, Mingyi Hong, Mehmet Akçakaya

Figure 1 for On Instabilities of Conventional Multi-Coil MRI Reconstruction to Small Adverserial Perturbations
Figure 2 for On Instabilities of Conventional Multi-Coil MRI Reconstruction to Small Adverserial Perturbations
Figure 3 for On Instabilities of Conventional Multi-Coil MRI Reconstruction to Small Adverserial Perturbations
Figure 4 for On Instabilities of Conventional Multi-Coil MRI Reconstruction to Small Adverserial Perturbations
Viaarxiv icon

On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning

Add code
Bookmark button
Alert button
Feb 20, 2021
Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang

Figure 1 for On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning
Figure 2 for On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning
Figure 3 for On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning
Figure 4 for On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning
Viaarxiv icon

Lottery Ticket Implies Accuracy Degradation, Is It a Desirable Phenomenon?

Add code
Bookmark button
Alert button
Feb 19, 2021
Ning Liu, Geng Yuan, Zhengping Che, Xuan Shen, Xiaolong Ma, Qing Jin, Jian Ren, Jian Tang, Sijia Liu, Yanzhi Wang

Figure 1 for Lottery Ticket Implies Accuracy Degradation, Is It a Desirable Phenomenon?
Figure 2 for Lottery Ticket Implies Accuracy Degradation, Is It a Desirable Phenomenon?
Figure 3 for Lottery Ticket Implies Accuracy Degradation, Is It a Desirable Phenomenon?
Figure 4 for Lottery Ticket Implies Accuracy Degradation, Is It a Desirable Phenomenon?
Viaarxiv icon

Fast Training of Provably Robust Neural Networks by SingleProp

Add code
Bookmark button
Alert button
Feb 01, 2021
Akhilan Boopathy, Tsui-Wei Weng, Sijia Liu, Pin-Yu Chen, Gaoyuan Zhang, Luca Daniel

Figure 1 for Fast Training of Provably Robust Neural Networks by SingleProp
Figure 2 for Fast Training of Provably Robust Neural Networks by SingleProp
Figure 3 for Fast Training of Provably Robust Neural Networks by SingleProp
Figure 4 for Fast Training of Provably Robust Neural Networks by SingleProp
Viaarxiv icon