Picture for Yizhen Wang

Yizhen Wang

Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

Add code
Oct 05, 2023
Viaarxiv icon

Robust Learning against Logical Adversaries

Add code
Jul 01, 2020
Figure 1 for Robust Learning against Logical Adversaries
Figure 2 for Robust Learning against Logical Adversaries
Figure 3 for Robust Learning against Logical Adversaries
Viaarxiv icon

Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits

Add code
Jun 07, 2019
Figure 1 for Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits
Figure 2 for Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits
Figure 3 for Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits
Figure 4 for Adversarial Examples for Non-Parametric Methods: Attacks, Defenses and Large Sample Limits
Viaarxiv icon

An Investigation of Data Poisoning Defenses for Online Learning

Add code
May 28, 2019
Figure 1 for An Investigation of Data Poisoning Defenses for Online Learning
Figure 2 for An Investigation of Data Poisoning Defenses for Online Learning
Figure 3 for An Investigation of Data Poisoning Defenses for Online Learning
Figure 4 for An Investigation of Data Poisoning Defenses for Online Learning
Viaarxiv icon

Data Poisoning Attacks against Online Learning

Add code
Aug 27, 2018
Figure 1 for Data Poisoning Attacks against Online Learning
Figure 2 for Data Poisoning Attacks against Online Learning
Figure 3 for Data Poisoning Attacks against Online Learning
Figure 4 for Data Poisoning Attacks against Online Learning
Viaarxiv icon

Analyzing the Robustness of Nearest Neighbors to Adversarial Examples

Add code
Jul 15, 2018
Figure 1 for Analyzing the Robustness of Nearest Neighbors to Adversarial Examples
Figure 2 for Analyzing the Robustness of Nearest Neighbors to Adversarial Examples
Figure 3 for Analyzing the Robustness of Nearest Neighbors to Adversarial Examples
Figure 4 for Analyzing the Robustness of Nearest Neighbors to Adversarial Examples
Viaarxiv icon

Pufferfish Privacy Mechanisms for Correlated Data

Add code
Mar 12, 2017
Figure 1 for Pufferfish Privacy Mechanisms for Correlated Data
Figure 2 for Pufferfish Privacy Mechanisms for Correlated Data
Figure 3 for Pufferfish Privacy Mechanisms for Correlated Data
Figure 4 for Pufferfish Privacy Mechanisms for Correlated Data
Viaarxiv icon