Picture for Adil Karjauv

Adil Karjauv

Object-Centric Diffusion for Efficient Video Editing

Add code
Jan 11, 2024
Viaarxiv icon

Investigating Top-$k$ White-Box and Transferable Black-box Attack

Add code
Mar 30, 2022
Figure 1 for Investigating Top-$k$ White-Box and Transferable Black-box Attack
Figure 2 for Investigating Top-$k$ White-Box and Transferable Black-box Attack
Figure 3 for Investigating Top-$k$ White-Box and Transferable Black-box Attack
Figure 4 for Investigating Top-$k$ White-Box and Transferable Black-box Attack
Viaarxiv icon

Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs

Add code
Oct 11, 2021
Figure 1 for Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Figure 2 for Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Figure 3 for Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Figure 4 for Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Viaarxiv icon

Universal Adversarial Training with Class-Wise Perturbations

Add code
Apr 07, 2021
Figure 1 for Universal Adversarial Training with Class-Wise Perturbations
Figure 2 for Universal Adversarial Training with Class-Wise Perturbations
Figure 3 for Universal Adversarial Training with Class-Wise Perturbations
Figure 4 for Universal Adversarial Training with Class-Wise Perturbations
Viaarxiv icon

A Survey On Universal Adversarial Attack

Add code
Mar 02, 2021
Figure 1 for A Survey On Universal Adversarial Attack
Figure 2 for A Survey On Universal Adversarial Attack
Figure 3 for A Survey On Universal Adversarial Attack
Viaarxiv icon

Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective

Add code
Feb 12, 2021
Figure 1 for Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective
Figure 2 for Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective
Figure 3 for Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective
Figure 4 for Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective
Viaarxiv icon

Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach

Add code
Dec 30, 2020
Figure 1 for Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach
Figure 2 for Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach
Figure 3 for Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach
Figure 4 for Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach
Viaarxiv icon

Robustness May Be at Odds with Fairness: An Empirical Study on Class-wise Accuracy

Add code
Oct 26, 2020
Figure 1 for Robustness May Be at Odds with Fairness: An Empirical Study on Class-wise Accuracy
Figure 2 for Robustness May Be at Odds with Fairness: An Empirical Study on Class-wise Accuracy
Viaarxiv icon

Revisiting Batch Normalization for Improving Corruption Robustness

Add code
Oct 07, 2020
Figure 1 for Revisiting Batch Normalization for Improving Corruption Robustness
Figure 2 for Revisiting Batch Normalization for Improving Corruption Robustness
Figure 3 for Revisiting Batch Normalization for Improving Corruption Robustness
Figure 4 for Revisiting Batch Normalization for Improving Corruption Robustness
Viaarxiv icon