Picture for Jianbo Chen

Jianbo Chen

A Transformer-based deep neural network model for SSVEP classification

Add code
Oct 09, 2022
Figure 1 for A Transformer-based deep neural network model for SSVEP classification
Figure 2 for A Transformer-based deep neural network model for SSVEP classification
Figure 3 for A Transformer-based deep neural network model for SSVEP classification
Figure 4 for A Transformer-based deep neural network model for SSVEP classification
Viaarxiv icon

QuTE: decentralized multiple testing on sensor networks with false discovery rate control

Add code
Oct 09, 2022
Figure 1 for QuTE: decentralized multiple testing on sensor networks with false discovery rate control
Figure 2 for QuTE: decentralized multiple testing on sensor networks with false discovery rate control
Figure 3 for QuTE: decentralized multiple testing on sensor networks with false discovery rate control
Figure 4 for QuTE: decentralized multiple testing on sensor networks with false discovery rate control
Viaarxiv icon

ML-LOO: Detecting Adversarial Examples with Feature Attribution

Add code
Jun 08, 2019
Figure 1 for ML-LOO: Detecting Adversarial Examples with Feature Attribution
Figure 2 for ML-LOO: Detecting Adversarial Examples with Feature Attribution
Figure 3 for ML-LOO: Detecting Adversarial Examples with Feature Attribution
Figure 4 for ML-LOO: Detecting Adversarial Examples with Feature Attribution
Viaarxiv icon

Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack

Add code
Apr 03, 2019
Figure 1 for Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack
Figure 2 for Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack
Figure 3 for Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack
Figure 4 for Boundary Attack++: Query-Efficient Decision-Based Adversarial Attack
Viaarxiv icon

LS-Tree: Model Interpretation When the Data Are Linguistic

Add code
Feb 11, 2019
Figure 1 for LS-Tree: Model Interpretation When the Data Are Linguistic
Figure 2 for LS-Tree: Model Interpretation When the Data Are Linguistic
Figure 3 for LS-Tree: Model Interpretation When the Data Are Linguistic
Figure 4 for LS-Tree: Model Interpretation When the Data Are Linguistic
Viaarxiv icon

Kernel Feature Selection via Conditional Covariance Minimization

Add code
Oct 20, 2018
Figure 1 for Kernel Feature Selection via Conditional Covariance Minimization
Figure 2 for Kernel Feature Selection via Conditional Covariance Minimization
Figure 3 for Kernel Feature Selection via Conditional Covariance Minimization
Viaarxiv icon

L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data

Add code
Aug 08, 2018
Figure 1 for L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data
Figure 2 for L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data
Figure 3 for L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data
Figure 4 for L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data
Viaarxiv icon

Learning to Explain: An Information-Theoretic Perspective on Model Interpretation

Add code
Jun 14, 2018
Figure 1 for Learning to Explain: An Information-Theoretic Perspective on Model Interpretation
Figure 2 for Learning to Explain: An Information-Theoretic Perspective on Model Interpretation
Figure 3 for Learning to Explain: An Information-Theoretic Perspective on Model Interpretation
Figure 4 for Learning to Explain: An Information-Theoretic Perspective on Model Interpretation
Viaarxiv icon

Language-Based Image Editing with Recurrent Attentive Models

Add code
Jun 10, 2018
Figure 1 for Language-Based Image Editing with Recurrent Attentive Models
Figure 2 for Language-Based Image Editing with Recurrent Attentive Models
Figure 3 for Language-Based Image Editing with Recurrent Attentive Models
Figure 4 for Language-Based Image Editing with Recurrent Attentive Models
Viaarxiv icon

Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data

Add code
May 31, 2018
Figure 1 for Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Figure 2 for Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Figure 3 for Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Figure 4 for Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
Viaarxiv icon