Search

Your search keyword '"Pin Yu"' showing total 3,063 results

Search Constraints

Start Over You searched for: Author "Pin Yu" Remove constraint Author: "Pin Yu"
3,063 results on '"Pin Yu"'

Search Results

351. Self-Progressing Robust Training

352. Zeroth-Order Hybrid Gradient Descent: Towards A Principled Black-Box Optimization Framework

353. Reprogramming Language Models for Molecular Representation Learning

354. SChME at SemEval-2020 Task 1: A Model Ensemble for Detecting Lexical Semantic Change

355. How Robust are Randomized Smoothing based Defenses to Data Poisoning?

356. Optimizing Molecules using Efficient Queries from Property Evaluations

357. Decentralizing Feature Extraction with Quantum Convolutional Neural Network for Automatic Speech Recognition

358. Higher-Order Certification for Randomized Smoothing

359. Optimizing Mode Connectivity via Neuron Alignment

360. Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases

361. Transfer Learning without Knowing: Reprogramming Black-box Machine Learning Models with Scarce Data and Limited Resources

362. Rate-improved Inexact Augmented Lagrangian Method for Constrained Nonconvex Optimization

363. Proper Network Interpretability Helps Adversarial Robustness in Classification

364. Fast Learning of Graph Neural Networks with Guaranteed Generalizability: One-hidden-layer Case

365. A Dynamical Systems Approach for Convergence of the Bayesian EM Algorithm

366. A Primer on Zeroth-Order Optimization in Signal Processing and Machine Learning

367. Accelerating Antimicrobial Discovery with Controllable Deep Generative Models and Molecular Dynamics

368. Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness

369. Characterizing Speech Adversarial Examples Using Self-Attention U-Net Enhancement

370. Hidden Cost of Randomized Smoothing

371. Towards an Efficient and General Framework of Robust Training for Graph Neural Networks

372. Defending against Backdoor Attack on Deep Neural Networks

373. Enhanced Adversarial Strategically-Timed Attacks against Deep Reinforcement Learning

374. AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks

375. Block Switching: A Stochastic Approach for Deep Learning Security

376. Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

377. CAT: Customized Adversarial Training for Improved Robustness

378. Reinforcement-Learning based Portfolio Management with Augmented Asset Movement Prediction States

392. Towards Verifying Robustness of Neural Networks Against Semantic Perturbations

393. Adversarial T-shirt! Evading Person Detectors in A Physical World

394. Is There a Trade-Off Between Fairness and Accuracy? A Perspective Using Mismatched Hypothesis Testing

396. Sign-OPT: A Query-Efficient Hard-label Adversarial Attack

397. One Explanation Does Not Fit All: A Toolkit and Taxonomy of AI Explainability Techniques

398. Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses

399. Reinforcement Learning based Interconnection Routing for Adaptive Traffic Optimization

400. On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method

Catalog

Books, media, physical & digital resources