Picture for Akshayvarun Subramanya

Akshayvarun Subramanya

Backdoor Attacks on Vision Transformers

Add code
Jun 16, 2022
Figure 1 for Backdoor Attacks on Vision Transformers
Figure 2 for Backdoor Attacks on Vision Transformers
Figure 3 for Backdoor Attacks on Vision Transformers
Figure 4 for Backdoor Attacks on Vision Transformers
Viaarxiv icon

A Simple Approach to Adversarial Robustness in Few-shot Image Classification

Add code
Apr 11, 2022
Figure 1 for A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Figure 2 for A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Figure 3 for A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Figure 4 for A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Viaarxiv icon

Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning

Add code
Dec 08, 2021
Figure 1 for Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning
Figure 2 for Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning
Figure 3 for Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning
Figure 4 for Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning
Viaarxiv icon

Adversarial Patches Exploiting Contextual Reasoning in Object Detection

Add code
Sep 30, 2019
Figure 1 for Adversarial Patches Exploiting Contextual Reasoning in Object Detection
Figure 2 for Adversarial Patches Exploiting Contextual Reasoning in Object Detection
Figure 3 for Adversarial Patches Exploiting Contextual Reasoning in Object Detection
Figure 4 for Adversarial Patches Exploiting Contextual Reasoning in Object Detection
Viaarxiv icon

Hidden Trigger Backdoor Attacks

Add code
Sep 30, 2019
Figure 1 for Hidden Trigger Backdoor Attacks
Figure 2 for Hidden Trigger Backdoor Attacks
Figure 3 for Hidden Trigger Backdoor Attacks
Figure 4 for Hidden Trigger Backdoor Attacks
Viaarxiv icon

Towards Hiding Adversarial Examples from Network Interpretation

Add code
Dec 06, 2018
Figure 1 for Towards Hiding Adversarial Examples from Network Interpretation
Figure 2 for Towards Hiding Adversarial Examples from Network Interpretation
Figure 3 for Towards Hiding Adversarial Examples from Network Interpretation
Figure 4 for Towards Hiding Adversarial Examples from Network Interpretation
Viaarxiv icon

Confidence estimation in Deep Neural networks via density modelling

Add code
Jul 21, 2017
Figure 1 for Confidence estimation in Deep Neural networks via density modelling
Figure 2 for Confidence estimation in Deep Neural networks via density modelling
Figure 3 for Confidence estimation in Deep Neural networks via density modelling
Figure 4 for Confidence estimation in Deep Neural networks via density modelling
Viaarxiv icon

Training Sparse Neural Networks

Add code
Nov 21, 2016
Figure 1 for Training Sparse Neural Networks
Figure 2 for Training Sparse Neural Networks
Figure 3 for Training Sparse Neural Networks
Figure 4 for Training Sparse Neural Networks
Viaarxiv icon