Picture for Huichen Li

Huichen Li

Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation

Add code
Jun 10, 2021
Figure 1 for Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation
Figure 2 for Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation
Figure 3 for Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation
Figure 4 for Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation
Viaarxiv icon

Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks

Add code
Feb 25, 2021
Figure 1 for Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Figure 2 for Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Figure 3 for Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Figure 4 for Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Viaarxiv icon

Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving

Add code
Jan 26, 2021
Figure 1 for Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Figure 2 for Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Figure 3 for Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Figure 4 for Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Viaarxiv icon

QEBA: Query-Efficient Boundary-Based Blackbox Attack

Add code
May 28, 2020
Figure 1 for QEBA: Query-Efficient Boundary-Based Blackbox Attack
Figure 2 for QEBA: Query-Efficient Boundary-Based Blackbox Attack
Figure 3 for QEBA: Query-Efficient Boundary-Based Blackbox Attack
Figure 4 for QEBA: Query-Efficient Boundary-Based Blackbox Attack
Viaarxiv icon

Detecting AI Trojans Using Meta Neural Analysis

Add code
Oct 09, 2019
Figure 1 for Detecting AI Trojans Using Meta Neural Analysis
Figure 2 for Detecting AI Trojans Using Meta Neural Analysis
Figure 3 for Detecting AI Trojans Using Meta Neural Analysis
Figure 4 for Detecting AI Trojans Using Meta Neural Analysis
Viaarxiv icon

Data Poisoning Attack against Unsupervised Node Embedding Methods

Add code
Nov 01, 2018
Figure 1 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 2 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 3 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 4 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Viaarxiv icon