Picture for Ji Gao

Ji Gao

Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning

Add code
Feb 07, 2022
Figure 1 for Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning
Figure 2 for Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning
Figure 3 for Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning
Figure 4 for Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning
Viaarxiv icon

Spotting adversarial samples for speaker verification by neural vocoders

Add code
Jul 02, 2021
Figure 1 for Spotting adversarial samples for speaker verification by neural vocoders
Figure 2 for Spotting adversarial samples for speaker verification by neural vocoders
Figure 3 for Spotting adversarial samples for speaker verification by neural vocoders
Figure 4 for Spotting adversarial samples for speaker verification by neural vocoders
Viaarxiv icon

Learning and Certification under Instance-targeted Poisoning

Add code
May 18, 2021
Figure 1 for Learning and Certification under Instance-targeted Poisoning
Figure 2 for Learning and Certification under Instance-targeted Poisoning
Figure 3 for Learning and Certification under Instance-targeted Poisoning
Viaarxiv icon

Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers

Add code
May 23, 2018
Figure 1 for Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Figure 2 for Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Figure 3 for Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Figure 4 for Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
Viaarxiv icon

Exploring the Naturalness of Buggy Code with Recurrent Neural Networks

Add code
Mar 21, 2018
Figure 1 for Exploring the Naturalness of Buggy Code with Recurrent Neural Networks
Figure 2 for Exploring the Naturalness of Buggy Code with Recurrent Neural Networks
Figure 3 for Exploring the Naturalness of Buggy Code with Recurrent Neural Networks
Figure 4 for Exploring the Naturalness of Buggy Code with Recurrent Neural Networks
Viaarxiv icon

A Fast and Scalable Joint Estimator for Learning Multiple Related Sparse Gaussian Graphical Models

Add code
Mar 20, 2018
Figure 1 for A Fast and Scalable Joint Estimator for Learning Multiple Related Sparse Gaussian Graphical Models
Figure 2 for A Fast and Scalable Joint Estimator for Learning Multiple Related Sparse Gaussian Graphical Models
Figure 3 for A Fast and Scalable Joint Estimator for Learning Multiple Related Sparse Gaussian Graphical Models
Viaarxiv icon

A Theoretical Framework for Robustness of (Deep) Classifiers against Adversarial Examples

Add code
Sep 27, 2017
Figure 1 for A Theoretical Framework for Robustness of (Deep) Classifiers against Adversarial Examples
Figure 2 for A Theoretical Framework for Robustness of (Deep) Classifiers against Adversarial Examples
Figure 3 for A Theoretical Framework for Robustness of (Deep) Classifiers against Adversarial Examples
Figure 4 for A Theoretical Framework for Robustness of (Deep) Classifiers against Adversarial Examples
Viaarxiv icon

DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples

Add code
Apr 17, 2017
Figure 1 for DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples
Figure 2 for DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples
Figure 3 for DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples
Figure 4 for DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples
Viaarxiv icon