Alert button
Picture for Yingjie Lao

Yingjie Lao

Alert button

Fully Attentional Networks with Self-emerging Token Labeling

Add code
Bookmark button
Alert button
Jan 08, 2024
Bingyin Zhao, Zhiding Yu, Shiyi Lan, Yutao Cheng, Anima Anandkumar, Yingjie Lao, Jose M. Alvarez

Viaarxiv icon

Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks

Add code
Bookmark button
Alert button
Oct 01, 2023
Quang H. Nguyen, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan

Viaarxiv icon

Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class

Add code
Bookmark button
Alert button
Oct 17, 2022
Khoa D. Doan, Yingjie Lao, Ping Li

Figure 1 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 2 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 3 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 4 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Viaarxiv icon

NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language

Add code
Bookmark button
Alert button
Aug 29, 2022
Faysal Hossain Shezan, Yingjie Lao, Minlong Peng, Xin Wang, Mingming Sun, Ping Li

Figure 1 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 2 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 3 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 4 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Viaarxiv icon

Defending Backdoor Attacks on Vision Transformer via Patch Processing

Add code
Bookmark button
Alert button
Jun 24, 2022
Khoa D. Doan, Yingjie Lao, Peng Yang, Ping Li

Figure 1 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 2 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 3 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 4 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Viaarxiv icon

Class-Oriented Poisoning Attack

Add code
Bookmark button
Alert button
Jul 31, 2020
Bingyin Zhao, Yingjie Lao

Figure 1 for Class-Oriented Poisoning Attack
Figure 2 for Class-Oriented Poisoning Attack
Figure 3 for Class-Oriented Poisoning Attack
Figure 4 for Class-Oriented Poisoning Attack
Viaarxiv icon

Rallying Adversarial Techniques against Deep Learning for Network Security

Add code
Bookmark button
Alert button
Mar 27, 2019
Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao

Figure 1 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 2 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 3 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 4 for Rallying Adversarial Techniques against Deep Learning for Network Security
Viaarxiv icon

Hardware Trojan Attacks on Neural Networks

Add code
Bookmark button
Alert button
Jun 14, 2018
Joseph Clements, Yingjie Lao

Figure 1 for Hardware Trojan Attacks on Neural Networks
Figure 2 for Hardware Trojan Attacks on Neural Networks
Figure 3 for Hardware Trojan Attacks on Neural Networks
Figure 4 for Hardware Trojan Attacks on Neural Networks
Viaarxiv icon