Picture for Yingqi Liu

Yingqi Liu

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense

Add code
Jan 16, 2023
Figure 1 for BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Figure 2 for BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Figure 3 for BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Figure 4 for BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Viaarxiv icon

Backdoor Vulnerabilities in Normally Trained Deep Learning Models

Add code
Nov 29, 2022
Figure 1 for Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Figure 2 for Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Figure 3 for Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Figure 4 for Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Viaarxiv icon

FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning

Add code
Oct 23, 2022
Figure 1 for FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Figure 2 for FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Figure 3 for FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Figure 4 for FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Viaarxiv icon

Efficient Image Super-Resolution using Vast-Receptive-Field Attention

Add code
Oct 12, 2022
Figure 1 for Efficient Image Super-Resolution using Vast-Receptive-Field Attention
Figure 2 for Efficient Image Super-Resolution using Vast-Receptive-Field Attention
Figure 3 for Efficient Image Super-Resolution using Vast-Receptive-Field Attention
Figure 4 for Efficient Image Super-Resolution using Vast-Receptive-Field Attention
Viaarxiv icon

Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps

Add code
Aug 16, 2022
Figure 1 for Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps
Figure 2 for Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps
Figure 3 for Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps
Figure 4 for Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps
Viaarxiv icon

DECK: Model Hardening for Defending Pervasive Backdoors

Add code
Jun 18, 2022
Figure 1 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 2 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 3 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 4 for DECK: Model Hardening for Defending Pervasive Backdoors
Viaarxiv icon

Blueprint Separable Residual Network for Efficient Image Super-Resolution

Add code
May 12, 2022
Figure 1 for Blueprint Separable Residual Network for Efficient Image Super-Resolution
Figure 2 for Blueprint Separable Residual Network for Efficient Image Super-Resolution
Figure 3 for Blueprint Separable Residual Network for Efficient Image Super-Resolution
Figure 4 for Blueprint Separable Residual Network for Efficient Image Super-Resolution
Viaarxiv icon

NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results

Add code
May 11, 2022
Figure 1 for NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results
Figure 2 for NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results
Figure 3 for NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results
Figure 4 for NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results
Viaarxiv icon

Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense

Add code
Feb 11, 2022
Figure 1 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 2 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 3 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 4 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Viaarxiv icon

EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry

Add code
Mar 17, 2021
Figure 1 for EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Figure 2 for EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Figure 3 for EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Figure 4 for EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Viaarxiv icon