Picture for Haripriya Harikumar

Haripriya Harikumar

Composite Concept Extraction through Backdooring

Add code
Jun 19, 2024
Viaarxiv icon

Revisiting the Dataset Bias Problem from a Statistical Perspective

Add code
Feb 05, 2024
Viaarxiv icon

Momentum Adversarial Distillation: Handling Large Distribution Shifts in Data-Free Knowledge Distillation

Add code
Sep 21, 2022
Figure 1 for Momentum Adversarial Distillation: Handling Large Distribution Shifts in Data-Free Knowledge Distillation
Figure 2 for Momentum Adversarial Distillation: Handling Large Distribution Shifts in Data-Free Knowledge Distillation
Figure 3 for Momentum Adversarial Distillation: Handling Large Distribution Shifts in Data-Free Knowledge Distillation
Figure 4 for Momentum Adversarial Distillation: Handling Large Distribution Shifts in Data-Free Knowledge Distillation
Viaarxiv icon

Defense Against Multi-target Trojan Attacks

Add code
Jul 08, 2022
Figure 1 for Defense Against Multi-target Trojan Attacks
Figure 2 for Defense Against Multi-target Trojan Attacks
Figure 3 for Defense Against Multi-target Trojan Attacks
Figure 4 for Defense Against Multi-target Trojan Attacks
Viaarxiv icon

Towards Effective and Robust Neural Trojan Defenses via Input Filtering

Add code
Mar 08, 2022
Figure 1 for Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Figure 2 for Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Figure 3 for Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Figure 4 for Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Viaarxiv icon

Semantic Host-free Trojan Attack

Add code
Oct 26, 2021
Figure 1 for Semantic Host-free Trojan Attack
Figure 2 for Semantic Host-free Trojan Attack
Figure 3 for Semantic Host-free Trojan Attack
Figure 4 for Semantic Host-free Trojan Attack
Viaarxiv icon

Scalable Backdoor Detection in Neural Networks

Add code
Jun 10, 2020
Figure 1 for Scalable Backdoor Detection in Neural Networks
Figure 2 for Scalable Backdoor Detection in Neural Networks
Figure 3 for Scalable Backdoor Detection in Neural Networks
Figure 4 for Scalable Backdoor Detection in Neural Networks
Viaarxiv icon