Alert button
Picture for Xue Lin

Xue Lin

Alert button

Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack

Add code
Bookmark button
Alert button
Mar 03, 2020
Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jack Jia, Xue Lin, Qi Alfred Chen

Figure 1 for Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack
Figure 2 for Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack
Figure 3 for Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack
Figure 4 for Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack
Viaarxiv icon

Automatic Perturbation Analysis on General Computational Graphs

Add code
Bookmark button
Alert button
Feb 28, 2020
Kaidi Xu, Zhouxing Shi, Huan Zhang, Minlie Huang, Kai-Wei Chang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh

Figure 1 for Automatic Perturbation Analysis on General Computational Graphs
Figure 2 for Automatic Perturbation Analysis on General Computational Graphs
Figure 3 for Automatic Perturbation Analysis on General Computational Graphs
Figure 4 for Automatic Perturbation Analysis on General Computational Graphs
Viaarxiv icon

Defending against Backdoor Attack on Deep Neural Networks

Add code
Bookmark button
Alert button
Feb 26, 2020
Hao Cheng, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Pu Zhao, Xue Lin

Figure 1 for Defending against Backdoor Attack on Deep Neural Networks
Figure 2 for Defending against Backdoor Attack on Deep Neural Networks
Figure 3 for Defending against Backdoor Attack on Deep Neural Networks
Figure 4 for Defending against Backdoor Attack on Deep Neural Networks
Viaarxiv icon

Towards an Efficient and General Framework of Robust Training for Graph Neural Networks

Add code
Bookmark button
Alert button
Feb 25, 2020
Kaidi Xu, Sijia Liu, Pin-Yu Chen, Mengshu Sun, Caiwen Ding, Bhavya Kailkhura, Xue Lin

Figure 1 for Towards an Efficient and General Framework of Robust Training for Graph Neural Networks
Figure 2 for Towards an Efficient and General Framework of Robust Training for Graph Neural Networks
Figure 3 for Towards an Efficient and General Framework of Robust Training for Graph Neural Networks
Figure 4 for Towards an Efficient and General Framework of Robust Training for Graph Neural Networks
Viaarxiv icon

BLK-REW: A Unified Block-based DNN Pruning Framework using Reweighted Regularization Method

Add code
Bookmark button
Alert button
Feb 22, 2020
Xiaolong Ma, Zhengang Li, Yifan Gong, Tianyun Zhang, Wei Niu, Zheng Zhan, Pu Zhao, Jian Tang, Xue Lin, Bin Ren, Yanzhi Wang

Figure 1 for BLK-REW: A Unified Block-based DNN Pruning Framework using Reweighted Regularization Method
Figure 2 for BLK-REW: A Unified Block-based DNN Pruning Framework using Reweighted Regularization Method
Figure 3 for BLK-REW: A Unified Block-based DNN Pruning Framework using Reweighted Regularization Method
Figure 4 for BLK-REW: A Unified Block-based DNN Pruning Framework using Reweighted Regularization Method
Viaarxiv icon

AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks

Add code
Bookmark button
Alert button
Feb 19, 2020
Xiao Wang, Siyue Wang, Pin-Yu Chen, Xue Lin, Peter Chin

Figure 1 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 2 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 3 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 4 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Viaarxiv icon

RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition

Add code
Bookmark button
Alert button
Feb 19, 2020
Peiyan Dong, Siyue Wang, Wei Niu, Chengming Zhang, Sheng Lin, Zhengang Li, Yifan Gong, Bin Ren, Xue Lin, Yanzhi Wang, Dingwen Tao

Figure 1 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 2 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 3 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 4 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Viaarxiv icon

Block Switching: A Stochastic Approach for Deep Learning Security

Add code
Bookmark button
Alert button
Feb 18, 2020
Xiao Wang, Siyue Wang, Pin-Yu Chen, Xue Lin, Peter Chin

Figure 1 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 2 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 3 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 4 for Block Switching: A Stochastic Approach for Deep Learning Security
Viaarxiv icon

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Add code
Bookmark button
Alert button
Feb 18, 2020
Pu Zhao, Pin-Yu Chen, Siyue Wang, Xue Lin

Figure 1 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 2 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 3 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 4 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Viaarxiv icon