Picture for Xinyang Zhang

Xinyang Zhang

i-Algebra: Towards Interactive Interpretability of Deep Neural Networks

Add code
Jan 22, 2021
Figure 1 for i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Figure 2 for i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Figure 3 for i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Figure 4 for i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Viaarxiv icon

Trojaning Language Models for Fun and Profit

Add code
Aug 01, 2020
Figure 1 for Trojaning Language Models for Fun and Profit
Figure 2 for Trojaning Language Models for Fun and Profit
Figure 3 for Trojaning Language Models for Fun and Profit
Figure 4 for Trojaning Language Models for Fun and Profit
Viaarxiv icon

AdvMind: Inferring Adversary Intent of Black-Box Attacks

Add code
Jun 16, 2020
Figure 1 for AdvMind: Inferring Adversary Intent of Black-Box Attacks
Figure 2 for AdvMind: Inferring Adversary Intent of Black-Box Attacks
Figure 3 for AdvMind: Inferring Adversary Intent of Black-Box Attacks
Figure 4 for AdvMind: Inferring Adversary Intent of Black-Box Attacks
Viaarxiv icon

Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction

Add code
Jan 01, 2020
Figure 1 for Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction
Figure 2 for Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction
Figure 3 for Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction
Figure 4 for Inf-VAE: A Variational Autoencoder Framework to Integrate Homophily and Influence in Diffusion Prediction
Viaarxiv icon

The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models

Add code
Nov 05, 2019
Figure 1 for The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Figure 2 for The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Figure 3 for The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Figure 4 for The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models
Viaarxiv icon

Interpretable Deep Learning under Fire

Add code
Dec 03, 2018
Figure 1 for Interpretable Deep Learning under Fire
Figure 2 for Interpretable Deep Learning under Fire
Figure 3 for Interpretable Deep Learning under Fire
Figure 4 for Interpretable Deep Learning under Fire
Viaarxiv icon

EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)

Add code
Aug 01, 2018
Figure 1 for EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)
Figure 2 for EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)
Figure 3 for EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)
Figure 4 for EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report)
Viaarxiv icon

Differentially Private Releasing via Deep Generative Model (Technical Report)

Add code
Mar 25, 2018
Figure 1 for Differentially Private Releasing via Deep Generative Model (Technical Report)
Figure 2 for Differentially Private Releasing via Deep Generative Model (Technical Report)
Figure 3 for Differentially Private Releasing via Deep Generative Model (Technical Report)
Figure 4 for Differentially Private Releasing via Deep Generative Model (Technical Report)
Viaarxiv icon

Motif-based Convolutional Neural Network on Graphs

Add code
Feb 05, 2018
Figure 1 for Motif-based Convolutional Neural Network on Graphs
Figure 2 for Motif-based Convolutional Neural Network on Graphs
Figure 3 for Motif-based Convolutional Neural Network on Graphs
Figure 4 for Motif-based Convolutional Neural Network on Graphs
Viaarxiv icon

Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge

Add code
Aug 25, 2017
Figure 1 for Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge
Figure 2 for Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge
Figure 3 for Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge
Figure 4 for Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge
Viaarxiv icon