Alert button
Picture for Youqi Li

Youqi Li

Alert button

Breaking the Complexity Barrier in Compositional Minimax Optimization

Add code
Bookmark button
Alert button
Aug 18, 2023
Jin Liu, Xiaokang Pan, Junwen Duan, Hongdong Li, Youqi Li, Zhe Qu

Figure 1 for Breaking the Complexity Barrier in Compositional Minimax Optimization
Figure 2 for Breaking the Complexity Barrier in Compositional Minimax Optimization
Figure 3 for Breaking the Complexity Barrier in Compositional Minimax Optimization
Figure 4 for Breaking the Complexity Barrier in Compositional Minimax Optimization
Viaarxiv icon

Multi-source adversarial transfer learning based on similar source domains with local features

Add code
Bookmark button
Alert button
May 30, 2023
Yifu Zhang, Hongru Li, Shimeng Shi, Youqi Li, Jiansong Zhang

Figure 1 for Multi-source adversarial transfer learning based on similar source domains with local features
Figure 2 for Multi-source adversarial transfer learning based on similar source domains with local features
Figure 3 for Multi-source adversarial transfer learning based on similar source domains with local features
Figure 4 for Multi-source adversarial transfer learning based on similar source domains with local features
Viaarxiv icon

A Certified Radius-Guided Attack Framework to Image Segmentation Models

Add code
Bookmark button
Alert button
Apr 05, 2023
Wenjie Qu, Youqi Li, Binghui Wang

Figure 1 for A Certified Radius-Guided Attack Framework to Image Segmentation Models
Figure 2 for A Certified Radius-Guided Attack Framework to Image Segmentation Models
Figure 3 for A Certified Radius-Guided Attack Framework to Image Segmentation Models
Figure 4 for A Certified Radius-Guided Attack Framework to Image Segmentation Models
Viaarxiv icon

Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees

Add code
Bookmark button
Alert button
May 07, 2022
Binghui Wang, Youqi Li, Pan Zhou

Figure 1 for Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Figure 2 for Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Figure 3 for Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Figure 4 for Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Viaarxiv icon