Alert button
Picture for Yizhen Wang

Yizhen Wang

Alert button

Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

Add code
Bookmark button
Alert button
Oct 05, 2023
Ahmed Abusnaina, Yizhen Wang, Sunpreet Arora, Ke Wang, Mihai Christodorescu, David Mohaisen

Viaarxiv icon

Robust Learning against Logical Adversaries

Add code
Bookmark button
Alert button
Jul 01, 2020
Yizhen Wang, Xiaozhu Meng, Mihai Christodorescu, Somesh Jha

Figure 1 for Robust Learning against Logical Adversaries
Figure 2 for Robust Learning against Logical Adversaries
Figure 3 for Robust Learning against Logical Adversaries
Viaarxiv icon

Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits

Add code
Bookmark button
Alert button
Jun 07, 2019
Yao-Yuan Yang, Cyrus Rashtchian, Yizhen Wang, Kamalika Chaudhuri

Figure 1 for Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits
Figure 2 for Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits
Figure 3 for Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits
Figure 4 for Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits
Viaarxiv icon

An Investigation of Data Poisoning Defenses for Online Learning

Add code
Bookmark button
Alert button
May 28, 2019
Yizhen Wang, Kamalika Chaudhuri

Figure 1 for An Investigation of Data Poisoning Defenses for Online Learning
Figure 2 for An Investigation of Data Poisoning Defenses for Online Learning
Figure 3 for An Investigation of Data Poisoning Defenses for Online Learning
Figure 4 for An Investigation of Data Poisoning Defenses for Online Learning
Viaarxiv icon

Data Poisoning Attacks against Online Learning

Add code
Bookmark button
Alert button
Aug 27, 2018
Yizhen Wang, Kamalika Chaudhuri

Figure 1 for Data Poisoning Attacks against Online Learning
Figure 2 for Data Poisoning Attacks against Online Learning
Figure 3 for Data Poisoning Attacks against Online Learning
Figure 4 for Data Poisoning Attacks against Online Learning
Viaarxiv icon

Analyzing the Robustness of Nearest Neighbors to Adversarial Examples

Add code
Bookmark button
Alert button
Jul 15, 2018
Yizhen Wang, Somesh Jha, Kamalika Chaudhuri

Figure 1 for Analyzing the Robustness of Nearest Neighbors to Adversarial Examples
Figure 2 for Analyzing the Robustness of Nearest Neighbors to Adversarial Examples
Figure 3 for Analyzing the Robustness of Nearest Neighbors to Adversarial Examples
Figure 4 for Analyzing the Robustness of Nearest Neighbors to Adversarial Examples
Viaarxiv icon

Pufferfish Privacy Mechanisms for Correlated Data

Add code
Bookmark button
Alert button
Mar 12, 2017
Shuang Song, Yizhen Wang, Kamalika Chaudhuri

Figure 1 for Pufferfish Privacy Mechanisms for Correlated Data
Figure 2 for Pufferfish Privacy Mechanisms for Correlated Data
Figure 3 for Pufferfish Privacy Mechanisms for Correlated Data
Figure 4 for Pufferfish Privacy Mechanisms for Correlated Data
Viaarxiv icon