Alert button
Picture for Xiaoyong Yuan

Xiaoyong Yuan

Alert button

ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles

Add code
Bookmark button
Alert button
Sep 21, 2020
Xiaoyong Yuan, Lei Ding, Lan Zhang, Xiaolin Li, Dapeng Wu

Figure 1 for ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Figure 2 for ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Figure 3 for ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Figure 4 for ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Viaarxiv icon

Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks

Add code
Bookmark button
Alert button
Sep 07, 2020
Xiaoyong Yuan, Lei Ding, Malek Ben Salem, Xiaolin Li, Dapeng Wu

Figure 1 for Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Figure 2 for Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Figure 3 for Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Figure 4 for Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Viaarxiv icon

Generalized Batch Normalization: Towards Accelerating Deep Neural Networks

Add code
Bookmark button
Alert button
Dec 08, 2018
Xiaoyong Yuan, Zheng Feng, Matthew Norton, Xiaolin Li

Figure 1 for Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Figure 2 for Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Figure 3 for Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Figure 4 for Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Viaarxiv icon

Adaptive Adversarial Attack on Scene Text Recognition

Add code
Bookmark button
Alert button
Jul 09, 2018
Xiaoyong Yuan, Pan He, Xiaolin Andy Li

Figure 1 for Adaptive Adversarial Attack on Scene Text Recognition
Figure 2 for Adaptive Adversarial Attack on Scene Text Recognition
Figure 3 for Adaptive Adversarial Attack on Scene Text Recognition
Figure 4 for Adaptive Adversarial Attack on Scene Text Recognition
Viaarxiv icon

Adversarial Examples: Attacks and Defenses for Deep Learning

Add code
Bookmark button
Alert button
Jul 07, 2018
Xiaoyong Yuan, Pan He, Qile Zhu, Xiaolin Li

Figure 1 for Adversarial Examples: Attacks and Defenses for Deep Learning
Figure 2 for Adversarial Examples: Attacks and Defenses for Deep Learning
Figure 3 for Adversarial Examples: Attacks and Defenses for Deep Learning
Figure 4 for Adversarial Examples: Attacks and Defenses for Deep Learning
Viaarxiv icon

Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection

Add code
Bookmark button
Alert button
Dec 04, 2017
Ruimin Sun, Xiaoyong Yuan, Pan He, Qile Zhu, Aokun Chen, Andre Gregio, Daniela Oliveira, Xiaolin Li

Figure 1 for Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Figure 2 for Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Figure 3 for Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Figure 4 for Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Viaarxiv icon