Picture for Hailun Ding

Hailun Ding

Rethinking the Reverse-engineering of Trojan Triggers

Add code
Oct 27, 2022
Viaarxiv icon

Neural Network Trojans Analysis and Mitigation from the Input Domain

Add code
Feb 16, 2022
Figure 1 for Neural Network Trojans Analysis and Mitigation from the Input Domain
Figure 2 for Neural Network Trojans Analysis and Mitigation from the Input Domain
Figure 3 for Neural Network Trojans Analysis and Mitigation from the Input Domain
Figure 4 for Neural Network Trojans Analysis and Mitigation from the Input Domain
Viaarxiv icon

Adversarial Feature Genome: a Data Driven Adversarial Examples Recognition Method

Add code
Dec 25, 2018
Figure 1 for Adversarial Feature Genome: a Data Driven Adversarial Examples Recognition Method
Figure 2 for Adversarial Feature Genome: a Data Driven Adversarial Examples Recognition Method
Figure 3 for Adversarial Feature Genome: a Data Driven Adversarial Examples Recognition Method
Figure 4 for Adversarial Feature Genome: a Data Driven Adversarial Examples Recognition Method
Viaarxiv icon

Understanding the Importance of Single Directions via Representative Substitution

Add code
Dec 06, 2018
Figure 1 for Understanding the Importance of Single Directions via Representative Substitution
Figure 2 for Understanding the Importance of Single Directions via Representative Substitution
Figure 3 for Understanding the Importance of Single Directions via Representative Substitution
Figure 4 for Understanding the Importance of Single Directions via Representative Substitution
Viaarxiv icon