Alert button
Picture for Tongliang Liu

Tongliang Liu

Alert button

Watermarking for Out-of-distribution Detection

Add code
Bookmark button
Alert button
Oct 27, 2022
Qizhou Wang, Feng Liu, Yonggang Zhang, Jing Zhang, Chen Gong, Tongliang Liu, Bo Han

Figure 1 for Watermarking for Out-of-distribution Detection
Figure 2 for Watermarking for Out-of-distribution Detection
Figure 3 for Watermarking for Out-of-distribution Detection
Figure 4 for Watermarking for Out-of-distribution Detection
Viaarxiv icon

Identifiability and Asymptotics in Learning Homogeneous Linear ODE Systems from Discrete Observations

Add code
Bookmark button
Alert button
Oct 12, 2022
Yuanyuan Wang, Wei Huang, Mingming Gong, Xi Geng, Tongliang Liu, Kun Zhang, Dacheng Tao

Figure 1 for Identifiability and Asymptotics in Learning Homogeneous Linear ODE Systems from Discrete Observations
Figure 2 for Identifiability and Asymptotics in Learning Homogeneous Linear ODE Systems from Discrete Observations
Figure 3 for Identifiability and Asymptotics in Learning Homogeneous Linear ODE Systems from Discrete Observations
Figure 4 for Identifiability and Asymptotics in Learning Homogeneous Linear ODE Systems from Discrete Observations
Viaarxiv icon

Towards Lightweight Black-Box Attacks against Deep Neural Networks

Add code
Bookmark button
Alert button
Oct 11, 2022
Chenghao Sun, Yonggang Zhang, Wan Chaoqun, Qizhou Wang, Ya Li, Tongliang Liu, Bo Han, Xinmei Tian

Figure 1 for Towards Lightweight Black-Box Attacks against Deep Neural Networks
Figure 2 for Towards Lightweight Black-Box Attacks against Deep Neural Networks
Viaarxiv icon

Strength-Adaptive Adversarial Training

Add code
Bookmark button
Alert button
Oct 04, 2022
Chaojian Yu, Dawei Zhou, Li Shen, Jun Yu, Bo Han, Mingming Gong, Nannan Wang, Tongliang Liu

Figure 1 for Strength-Adaptive Adversarial Training
Figure 2 for Strength-Adaptive Adversarial Training
Figure 3 for Strength-Adaptive Adversarial Training
Figure 4 for Strength-Adaptive Adversarial Training
Viaarxiv icon

Symmetric Pruning in Quantum Neural Networks

Add code
Bookmark button
Alert button
Aug 30, 2022
Xinbiao Wang, Junyu Liu, Tongliang Liu, Yong Luo, Yuxuan Du, Dacheng Tao

Figure 1 for Symmetric Pruning in Quantum Neural Networks
Figure 2 for Symmetric Pruning in Quantum Neural Networks
Figure 3 for Symmetric Pruning in Quantum Neural Networks
Figure 4 for Symmetric Pruning in Quantum Neural Networks
Viaarxiv icon

Improving Adversarial Robustness via Mutual Information Estimation

Add code
Bookmark button
Alert button
Jul 25, 2022
Dawei Zhou, Nannan Wang, Xinbo Gao, Bo Han, Xiaoyu Wang, Yibing Zhan, Tongliang Liu

Figure 1 for Improving Adversarial Robustness via Mutual Information Estimation
Figure 2 for Improving Adversarial Robustness via Mutual Information Estimation
Figure 3 for Improving Adversarial Robustness via Mutual Information Estimation
Figure 4 for Improving Adversarial Robustness via Mutual Information Estimation
Viaarxiv icon

Harnessing Out-Of-Distribution Examples via Augmenting Content and Style

Add code
Bookmark button
Alert button
Jul 07, 2022
Zhuo Huang, Xiaobo Xia, Li Shen, Bo Han, Mingming Gong, Chen Gong, Tongliang Liu

Figure 1 for Harnessing Out-Of-Distribution Examples via Augmenting Content and Style
Figure 2 for Harnessing Out-Of-Distribution Examples via Augmenting Content and Style
Figure 3 for Harnessing Out-Of-Distribution Examples via Augmenting Content and Style
Figure 4 for Harnessing Out-Of-Distribution Examples via Augmenting Content and Style
Viaarxiv icon

Understanding Robust Overfitting of Adversarial Training and Beyond

Add code
Bookmark button
Alert button
Jun 22, 2022
Chaojian Yu, Bo Han, Li Shen, Jun Yu, Chen Gong, Mingming Gong, Tongliang Liu

Figure 1 for Understanding Robust Overfitting of Adversarial Training and Beyond
Figure 2 for Understanding Robust Overfitting of Adversarial Training and Beyond
Figure 3 for Understanding Robust Overfitting of Adversarial Training and Beyond
Figure 4 for Understanding Robust Overfitting of Adversarial Training and Beyond
Viaarxiv icon

Bilateral Dependency Optimization: Defending Against Model-inversion Attacks

Add code
Bookmark button
Alert button
Jun 18, 2022
Xiong Peng, Feng Liu, Jingfen Zhang, Long Lan, Junjie Ye, Tongliang Liu, Bo Han

Figure 1 for Bilateral Dependency Optimization: Defending Against Model-inversion Attacks
Figure 2 for Bilateral Dependency Optimization: Defending Against Model-inversion Attacks
Figure 3 for Bilateral Dependency Optimization: Defending Against Model-inversion Attacks
Figure 4 for Bilateral Dependency Optimization: Defending Against Model-inversion Attacks
Viaarxiv icon