Picture for Xue Lin

Xue Lin

Block Switching: A Stochastic Approach for Deep Learning Security

Add code
Feb 18, 2020
Figure 1 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 2 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 3 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 4 for Block Switching: A Stochastic Approach for Deep Learning Security
Viaarxiv icon

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Add code
Feb 18, 2020
Figure 1 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 2 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 3 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 4 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Viaarxiv icon

PatDNN: Achieving Real-Time DNN Execution on Mobile Devices with Pattern-based Weight Pruning

Add code
Jan 22, 2020
Figure 1 for PatDNN: Achieving Real-Time DNN Execution on Mobile Devices with Pattern-based Weight Pruning
Figure 2 for PatDNN: Achieving Real-Time DNN Execution on Mobile Devices with Pattern-based Weight Pruning
Figure 3 for PatDNN: Achieving Real-Time DNN Execution on Mobile Devices with Pattern-based Weight Pruning
Figure 4 for PatDNN: Achieving Real-Time DNN Execution on Mobile Devices with Pattern-based Weight Pruning
Viaarxiv icon

Adversarial T-shirt! Evading Person Detectors in A Physical World

Add code
Nov 27, 2019
Viaarxiv icon

ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization

Add code
Oct 16, 2019
Figure 1 for ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization
Figure 2 for ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization
Figure 3 for ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization
Figure 4 for ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization
Viaarxiv icon

Reweighted Proximal Pruning for Large-Scale Language Representation

Add code
Sep 27, 2019
Figure 1 for Reweighted Proximal Pruning for Large-Scale Language Representation
Figure 2 for Reweighted Proximal Pruning for Large-Scale Language Representation
Figure 3 for Reweighted Proximal Pruning for Large-Scale Language Representation
Viaarxiv icon

PCONV: The Missing but Desirable Sparsity in DNN Weight Pruning for Real-time Execution on Mobile Devices

Add code
Sep 12, 2019
Figure 1 for PCONV: The Missing but Desirable Sparsity in DNN Weight Pruning for Real-time Execution on Mobile Devices
Figure 2 for PCONV: The Missing but Desirable Sparsity in DNN Weight Pruning for Real-time Execution on Mobile Devices
Figure 3 for PCONV: The Missing but Desirable Sparsity in DNN Weight Pruning for Real-time Execution on Mobile Devices
Figure 4 for PCONV: The Missing but Desirable Sparsity in DNN Weight Pruning for Real-time Execution on Mobile Devices
Viaarxiv icon

Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses

Add code
Aug 20, 2019
Figure 1 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 2 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 3 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 4 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Viaarxiv icon

On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method

Add code
Jul 26, 2019
Figure 1 for On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Figure 2 for On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Figure 3 for On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Figure 4 for On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method
Viaarxiv icon

Non-structured DNN Weight Pruning Considered Harmful

Add code
Jul 03, 2019
Figure 1 for Non-structured DNN Weight Pruning Considered Harmful
Figure 2 for Non-structured DNN Weight Pruning Considered Harmful
Figure 3 for Non-structured DNN Weight Pruning Considered Harmful
Figure 4 for Non-structured DNN Weight Pruning Considered Harmful
Viaarxiv icon