Picture for Jinfeng Yi

Jinfeng Yi

Efficient Algorithms for Generalized Linear Bandits with Heavy-tailed Rewards

Add code
Oct 28, 2023
Viaarxiv icon

Smoothed Online Convex Optimization Based on Discounted-Normal-Predictor

Add code
May 02, 2022
Viaarxiv icon

How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective

Add code
Mar 27, 2022
Figure 1 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 2 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 3 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Figure 4 for How to Robustify Black-Box ML Models? A Zeroth-Order Optimization Perspective
Viaarxiv icon

Can Adversarial Training Be Manipulated By Non-Robust Features?

Add code
Jan 31, 2022
Figure 1 for Can Adversarial Training Be Manipulated By Non-Robust Features?
Figure 2 for Can Adversarial Training Be Manipulated By Non-Robust Features?
Figure 3 for Can Adversarial Training Be Manipulated By Non-Robust Features?
Figure 4 for Can Adversarial Training Be Manipulated By Non-Robust Features?
Viaarxiv icon

On the Convergence and Robustness of Adversarial Training

Add code
Dec 15, 2021
Figure 1 for On the Convergence and Robustness of Adversarial Training
Figure 2 for On the Convergence and Robustness of Adversarial Training
Figure 3 for On the Convergence and Robustness of Adversarial Training
Figure 4 for On the Convergence and Robustness of Adversarial Training
Viaarxiv icon

Federated Two-stage Learning with Sign-based Voting

Add code
Dec 10, 2021
Figure 1 for Federated Two-stage Learning with Sign-based Voting
Figure 2 for Federated Two-stage Learning with Sign-based Voting
Figure 3 for Federated Two-stage Learning with Sign-based Voting
Figure 4 for Federated Two-stage Learning with Sign-based Voting
Viaarxiv icon

How and When Adversarial Robustness Transfers in Knowledge Distillation?

Add code
Oct 22, 2021
Figure 1 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 2 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 3 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 4 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Viaarxiv icon

Adversarial Attack across Datasets

Add code
Oct 13, 2021
Figure 1 for Adversarial Attack across Datasets
Figure 2 for Adversarial Attack across Datasets
Figure 3 for Adversarial Attack across Datasets
Figure 4 for Adversarial Attack across Datasets
Viaarxiv icon

Trustworthy AI: From Principles to Practices

Add code
Oct 04, 2021
Figure 1 for Trustworthy AI: From Principles to Practices
Figure 2 for Trustworthy AI: From Principles to Practices
Figure 3 for Trustworthy AI: From Principles to Practices
Figure 4 for Trustworthy AI: From Principles to Practices
Viaarxiv icon

Training Meta-Surrogate Model for Transferable Adversarial Attack

Add code
Sep 07, 2021
Figure 1 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 2 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 3 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 4 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Viaarxiv icon