Alert button
Picture for Yunhan Jia

Yunhan Jia

Alert button

Towards Practical Lottery Ticket Hypothesis for Adversarial Training

Add code
Bookmark button
Alert button
Mar 06, 2020
Bai Li, Shiqi Wang, Yunhan Jia, Yantao Lu, Zhenyu Zhong, Lawrence Carin, Suman Jana

Figure 1 for Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Figure 2 for Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Figure 3 for Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Figure 4 for Towards Practical Lottery Ticket Hypothesis for Adversarial Training
Viaarxiv icon

Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction

Add code
Bookmark button
Alert button
Nov 22, 2019
Yantao Lu, Yunhan Jia, Jianyu Wang, Bai Li, Weiheng Chai, Lawrence Carin, Senem Velipasalar

Figure 1 for Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction
Figure 2 for Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction
Figure 3 for Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction
Figure 4 for Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction
Viaarxiv icon

Explainable Machine Learning in Deployment

Add code
Bookmark button
Alert button
Sep 13, 2019
Umang Bhatt, Alice Xiang, Shubham Sharma, Adrian Weller, Ankur Taly, Yunhan Jia, Joydeep Ghosh, Ruchir Puri, José M. F. Moura, Peter Eckersley

Figure 1 for Explainable Machine Learning in Deployment
Viaarxiv icon

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking

Add code
Bookmark button
Alert button
May 30, 2019
Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei

Figure 1 for Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking
Figure 2 for Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking
Figure 3 for Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking
Figure 4 for Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking
Viaarxiv icon

Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction

Add code
Bookmark button
Alert button
May 08, 2019
Yunhan Jia, Yantao Lu, Senem Velipasalar, Zhenyu Zhong, Tao Wei

Figure 1 for Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction
Figure 2 for Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction
Figure 3 for Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction
Figure 4 for Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction
Viaarxiv icon