Picture for Xinyang Zhang

Xinyang Zhang

SoK: On the Semantic AI Security in Autonomous Driving

Add code
Mar 10, 2022
Figure 1 for SoK: On the Semantic AI Security in Autonomous Driving
Figure 2 for SoK: On the Semantic AI Security in Autonomous Driving
Figure 3 for SoK: On the Semantic AI Security in Autonomous Driving
Figure 4 for SoK: On the Semantic AI Security in Autonomous Driving
Viaarxiv icon

Detecting Safety Problems of Multi-Sensor Fusion in Autonomous Driving

Add code
Sep 14, 2021
Figure 1 for Detecting Safety Problems of Multi-Sensor Fusion in Autonomous Driving
Figure 2 for Detecting Safety Problems of Multi-Sensor Fusion in Autonomous Driving
Figure 3 for Detecting Safety Problems of Multi-Sensor Fusion in Autonomous Driving
Figure 4 for Detecting Safety Problems of Multi-Sensor Fusion in Autonomous Driving
Viaarxiv icon

Minimally-Supervised Structure-Rich Text Categorization via Learning on Text-Rich Networks

Add code
Feb 23, 2021
Figure 1 for Minimally-Supervised Structure-Rich Text Categorization via Learning on Text-Rich Networks
Figure 2 for Minimally-Supervised Structure-Rich Text Categorization via Learning on Text-Rich Networks
Figure 3 for Minimally-Supervised Structure-Rich Text Categorization via Learning on Text-Rich Networks
Figure 4 for Minimally-Supervised Structure-Rich Text Categorization via Learning on Text-Rich Networks
Viaarxiv icon

i-Algebra: Towards Interactive Interpretability of Deep Neural Networks

Add code
Jan 22, 2021
Figure 1 for i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Figure 2 for i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Figure 3 for i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Figure 4 for i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Viaarxiv icon

Trojaning Language Models for Fun and Profit

Add code
Aug 01, 2020
Figure 1 for Trojaning Language Models for Fun and Profit
Figure 2 for Trojaning Language Models for Fun and Profit
Figure 3 for Trojaning Language Models for Fun and Profit
Figure 4 for Trojaning Language Models for Fun and Profit
Viaarxiv icon

AdvMind: Inferring Adversary Intent of Black-Box Attacks

Add code
Jun 16, 2020
Figure 1 for AdvMind: Inferring Adversary Intent of Black-Box Attacks
Figure 2 for AdvMind: Inferring Adversary Intent of Black-Box Attacks
Figure 3 for AdvMind: Inferring Adversary Intent of Black-Box Attacks
Figure 4 for AdvMind: Inferring Adversary Intent of Black-Box Attacks
Viaarxiv icon

Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction

Add code
Jan 01, 2020
Figure 1 for Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction
Figure 2 for Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction
Figure 3 for Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction
Figure 4 for Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction
Viaarxiv icon

The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models

Add code
Nov 05, 2019
Figure 1 for The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Figure 2 for The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Figure 3 for The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Figure 4 for The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Viaarxiv icon

Interpretable Deep Learning under Fire

Add code
Dec 03, 2018
Figure 1 for Interpretable Deep Learning under Fire
Figure 2 for Interpretable Deep Learning under Fire
Figure 3 for Interpretable Deep Learning under Fire
Figure 4 for Interpretable Deep Learning under Fire
Viaarxiv icon

EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)

Add code
Aug 01, 2018
Figure 1 for EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)
Figure 2 for EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)
Figure 3 for EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)
Figure 4 for EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)
Viaarxiv icon