Alert button
Picture for Zhaoquan Gu

Zhaoquan Gu

Alert button

F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns

Add code
Bookmark button
Alert button
Oct 23, 2023
Yaguan Qian, Chenyu Zhao, Zhaoquan Gu, Bin Wang, Shouling Ji, Wei Wang, Boyang Zhou, Pan Zhou

Figure 1 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 2 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 3 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 4 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Viaarxiv icon

When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection

Add code
Bookmark button
Alert button
Aug 21, 2023
Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, Zhaoquan Gu

Figure 1 for When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Figure 2 for When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Figure 3 for When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Figure 4 for When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Viaarxiv icon

Adversarial Attacks on ASR Systems: An Overview

Add code
Bookmark button
Alert button
Aug 03, 2022
Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu

Figure 1 for Adversarial Attacks on ASR Systems: An Overview
Figure 2 for Adversarial Attacks on ASR Systems: An Overview
Figure 3 for Adversarial Attacks on ASR Systems: An Overview
Viaarxiv icon

Hessian-Free Second-Order Adversarial Examples for Adversarial Learning

Add code
Bookmark button
Alert button
Jul 04, 2022
Yaguan Qian, Yuqi Wang, Bin Wang, Zhaoquan Gu, Yuhan Guo, Wassim Swaileh

Figure 1 for Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
Figure 2 for Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
Figure 3 for Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
Figure 4 for Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
Viaarxiv icon

Improving robustness of language models from a geometry-aware perspective

Add code
Bookmark button
Alert button
Apr 28, 2022
Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan

Figure 1 for Improving robustness of language models from a geometry-aware perspective
Figure 2 for Improving robustness of language models from a geometry-aware perspective
Figure 3 for Improving robustness of language models from a geometry-aware perspective
Figure 4 for Improving robustness of language models from a geometry-aware perspective
Viaarxiv icon

One model Packs Thousands of Items with Recurrent Conditional Query Learning

Add code
Bookmark button
Alert button
Nov 12, 2021
Dongda Li, Zhaoquan Gu, Yuexuan Wang, Changwei Ren, Francis C. M. Lau

Figure 1 for One model Packs Thousands of Items with Recurrent Conditional Query Learning
Figure 2 for One model Packs Thousands of Items with Recurrent Conditional Query Learning
Figure 3 for One model Packs Thousands of Items with Recurrent Conditional Query Learning
Figure 4 for One model Packs Thousands of Items with Recurrent Conditional Query Learning
Viaarxiv icon

TREATED:Towards Universal Defense against Textual Adversarial Attacks

Add code
Bookmark button
Alert button
Sep 13, 2021
Bin Zhu, Zhaoquan Gu, Le Wang, Zhihong Tian

Figure 1 for TREATED:Towards Universal Defense against Textual Adversarial Attacks
Figure 2 for TREATED:Towards Universal Defense against Textual Adversarial Attacks
Figure 3 for TREATED:Towards Universal Defense against Textual Adversarial Attacks
Figure 4 for TREATED:Towards Universal Defense against Textual Adversarial Attacks
Viaarxiv icon

CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue

Add code
Bookmark button
Alert button
Aug 13, 2021
Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang

Figure 1 for CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue
Figure 2 for CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue
Figure 3 for CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue
Figure 4 for CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue
Viaarxiv icon

Towards Speeding up Adversarial Training in Latent Spaces

Add code
Bookmark button
Alert button
Feb 01, 2021
Yaguan Qian, Qiqi Shao, Tengteng Yao, Bin Wang, Shaoning Zeng, Zhaoquan Gu, Wassim Swaileh

Figure 1 for Towards Speeding up Adversarial Training in Latent Spaces
Figure 2 for Towards Speeding up Adversarial Training in Latent Spaces
Figure 3 for Towards Speeding up Adversarial Training in Latent Spaces
Figure 4 for Towards Speeding up Adversarial Training in Latent Spaces
Viaarxiv icon

Towards Imperceptible Adversarial Image Patches Based on Network Explanations

Add code
Bookmark button
Alert button
Dec 10, 2020
Yaguan Qian, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling, Chunming Wu

Figure 1 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 2 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 3 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Figure 4 for Towards Imperceptible Adversarial Image Patches Based on Network Explanations
Viaarxiv icon