Picture for Robi Polikar

Robi Polikar

Adversary Aware Continual Learning

Add code
Apr 27, 2023
Viaarxiv icon

Contributor-Aware Defenses Against Adversarial Backdoor Attacks

Add code
May 28, 2022
Figure 1 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 2 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 3 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 4 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Viaarxiv icon

False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger

Add code
Feb 09, 2022
Figure 1 for False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger
Figure 2 for False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger
Figure 3 for False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger
Figure 4 for False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger
Viaarxiv icon

Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness

Add code
Jun 05, 2021
Figure 1 for Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness
Figure 2 for Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness
Figure 3 for Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness
Figure 4 for Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness
Viaarxiv icon

Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models

Add code
Feb 16, 2021
Figure 1 for Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models
Figure 2 for Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models
Figure 3 for Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models
Figure 4 for Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models
Viaarxiv icon

OpinionRank: Extracting Ground Truth Labels from Unreliable Expert Opinions with Graph-Based Spectral Ranking

Add code
Feb 11, 2021
Figure 1 for OpinionRank: Extracting Ground Truth Labels from Unreliable Expert Opinions with Graph-Based Spectral Ranking
Figure 2 for OpinionRank: Extracting Ground Truth Labels from Unreliable Expert Opinions with Graph-Based Spectral Ranking
Figure 3 for OpinionRank: Extracting Ground Truth Labels from Unreliable Expert Opinions with Graph-Based Spectral Ranking
Figure 4 for OpinionRank: Extracting Ground Truth Labels from Unreliable Expert Opinions with Graph-Based Spectral Ranking
Viaarxiv icon

Comparative Analysis of Extreme Verification Latency Learning Algorithms

Add code
Nov 26, 2020
Figure 1 for Comparative Analysis of Extreme Verification Latency Learning Algorithms
Figure 2 for Comparative Analysis of Extreme Verification Latency Learning Algorithms
Figure 3 for Comparative Analysis of Extreme Verification Latency Learning Algorithms
Figure 4 for Comparative Analysis of Extreme Verification Latency Learning Algorithms
Viaarxiv icon

Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks

Add code
Feb 17, 2020
Figure 1 for Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks
Figure 2 for Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks
Figure 3 for Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks
Figure 4 for Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks
Viaarxiv icon

Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning

Add code
Feb 20, 2018
Figure 1 for Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning
Figure 2 for Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning
Figure 3 for Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning
Figure 4 for Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning
Viaarxiv icon