Pin‐yu Chen
#155,024
Most Influential Person Now
Pin‐yu Chen's AcademicInfluence.com Rankings
Pin‐yu Chencomputer-science Degrees
Computer Science
#8466
World Rank
#8899
Historical Rank
Algorithms
#332
World Rank
#337
Historical Rank
Machine Learning
#3473
World Rank
#3516
Historical Rank
Artificial Intelligence
#3774
World Rank
#3829
Historical Rank

Download Badge
Computer Science
Pin‐yu Chen's Degrees
- Bachelors Computer Science National Taiwan University
Similar Degrees You Can Earn
Why Is Pin‐yu Chen Influential?
(Suggest an Edit or Addition)Pin‐yu Chen's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models (2017) (1249)
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples (2017) (498)
- Efficient Neural Network Robustness Certification with General Activation Functions (2018) (479)
- Explanations based on the Missing: Towards Contrastive Explanations with Pertinent Negatives (2018) (401)
- Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach (2018) (348)
- Is Robustness the Cost of Accuracy? - A Comprehensive Study on the Robustness of 18 Deep Image Classification Models (2018) (310)
- DBA: Distributed Backdoor Attacks against Federated Learning (2020) (304)
- AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks (2018) (287)
- Query-Efficient Hard-label Black-box Attack: An Optimization-based Approach (2018) (277)
- Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective (2019) (241)
- One Explanation Does Not Fit All: A Toolkit and Taxonomy of AI Explainability Techniques (2019) (227)
- Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples (2018) (179)
- Adversarial T-Shirt! Evading Person Detectors in a Physical World (2019) (172)
- Smart attacks in smart grid communication networks (2012) (171)
- Vision Transformers are Robust Learners (2021) (145)
- Variational Quantum Circuits for Deep Reinforcement Learning (2019) (137)
- On Modeling Malware Propagation in Generalized Social Networks (2011) (136)
- Structured Adversarial Attack: Towards General Implementation and Better Interpretability (2018) (133)
- Sign-OPT: A Query-Efficient Hard-label Adversarial Attack (2019) (127)
- Characterizing Audio Adversarial Examples Using Temporal Dependency (2018) (117)
- Zeroth-Order Stochastic Variance Reduction for Nonconvex Optimization (2018) (111)
- Attacking the Madry Defense Model with L1-based Adversarial Examples (2017) (110)
- Accelerated antimicrobial discovery via deep generative models and molecular dynamics simulations (2021) (106)
- CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Networks (2018) (106)
- Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness (2020) (95)
- Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning (2017) (94)
- Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases (2020) (90)
- On the Adversarial Robustness of Vision Transformers (2021) (88)
- Word Mover’s Embedding: From Word2Vec to Document Embedding (2018) (88)
- Principled Multilayer Network Embedding (2017) (84)
- A Primer on Zeroth-Order Optimization in Signal Processing and Machine Learning: Principals, Recent Advances, and Applications (2020) (79)
- Information Fusion to Defend Intentional Attack in Internet of Things (2014) (76)
- Optimal Control of Epidemic Information Dissemination Over Networks (2014) (75)
- Discrete Adversarial Attacks and Submodular Optimization with Applications to Text Classification (2018) (70)
- CAT: Customized Adversarial Training for Improved Robustness (2020) (68)
- Is There a Trade-Off Between Fairness and Accuracy? A Perspective Using Mismatched Hypothesis Testing (2020) (67)
- signSGD via Zeroth-Order Oracle (2019) (66)
- Zeroth-Order Online Alternating Direction Method of Multipliers: Convergence Analysis and Applications (2017) (66)
- PROVEN: Certifying Robustness of Neural Networks with a Probabilistic Approach (2018) (63)
- CRFL: Certifiably Robust Federated Learning against Backdoor Attacks (2021) (57)
- Reinforcement-Learning based Portfolio Management with Augmented Asset Movement Prediction States (2020) (57)
- Model Agnostic Contrastive Explanations for Structured Data (2019) (54)
- Decentralizing Feature Extraction with Quantum Convolutional Neural Network for Automatic Speech Recognition (2020) (54)
- Multilayer Spectral Graph Clustering via Convex Layer Aggregation: Theory and Algorithms (2017) (50)
- Traffic-Aware Patching for Cyber Security in Mobile IoT (2017) (46)
- Show-and-Fool: Crafting Adversarial Examples for Neural Image Captioning (2017) (46)
- When Does Contrastive Learning Preserve Adversarial Robustness from Pretraining to Finetuning? (2021) (45)
- Voice2Series: Reprogramming Acoustic Models for Time Series Classification (2021) (44)
- Towards Verifying Robustness of Neural Networks Against A Family of Semantic Perturbations (2020) (44)
- Deep Community Detection (2014) (43)
- Characterizing Speech Adversarial Examples Using Self-Attention U-Net Enhancement (2020) (42)
- AI Explainability 360: An Extensible Toolkit for Understanding Data and Machine Learning Models (2020) (41)
- Information Epidemics in Complex Networks with Opportunistic Links and Dynamic Topology (2010) (40)
- Transfer Learning without Knowing: Reprogramming Black-box Machine Learning Models with Scarce Data and Limited Resources (2020) (39)
- When crowdsourcing meets mobile sensing: a social network perspective (2015) (39)
- On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method (2019) (38)
- Generating Contrastive Explanations with Monotonic Attribute Functions (2019) (38)
- Assessing and safeguarding network resilience to nodal attacks (2014) (38)
- Proper Network Interpretability Helps Adversarial Robustness in Classification (2020) (36)
- Multi-path routing with end-to-end statistical QoS Provisioning in Underlay Cognitive Radio Networks (2011) (36)
- Local Fiedler vector centrality for detection of deep and overlapping communities in networks (2014) (34)
- ScaleCom: Scalable Sparsified Gradient Compression for Communication-Efficient Distributed Training (2021) (33)
- Optimizing molecules using efficient queries from property evaluations (2020) (32)
- Bypassing Feature Squeezing by Increasing Adversary Strength (2018) (31)
- Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses (2019) (31)
- Phase Transitions in Spectral Community Detection (2014) (31)
- Neural-Brane: Neural Bayesian Personalized Ranking for Attributed Network Embedding (2018) (29)
- Fold2Seq: A Joint Sequence(1D)-Fold(3D) Embedding-based Generative Model for Protein Design (2021) (28)
- Defending against Backdoor Attack on Deep Neural Networks (2020) (27)
- Scalable Spectral Clustering Using Random Binning Features (2018) (26)
- Multi-centrality graph spectral decompositions and their application to cyber intrusion detection (2015) (26)
- CAFE: Catastrophic Data Leakage in Vertical Federated Learning (2021) (26)
- Higher-Order Certification for Randomized Smoothing (2020) (25)
- Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent (2020) (24)
- Rate-improved inexact augmented Lagrangian method for constrained nonconvex optimization (2020) (24)
- Rate-Delay Enhanced Multipath Transmission Scheme via Network Coding in Multihop Networks (2012) (23)
- Discrete Attacks and Submodular Optimization with Applications to Text Classification (2018) (23)
- Towards A Unified Min-Max Framework for Adversarial Exploration and Robustness (2019) (23)
- Node removal vulnerability of the largest component of a network (2013) (23)
- Evading Real-Time Person Detectors by Adversarial T-shirt (2019) (22)
- Artificial intelligence method to design and fold alpha-helical structural proteins from the primary amino acid sequence (2019) (22)
- Genome Architecture Mediates Transcriptional Control of Human Myogenic Reprogramming (2018) (22)
- ZEROTH-ORDER STOCHASTIC PROJECTED GRADIENT DESCENT FOR NONCONVEX OPTIMIZATION (2018) (21)
- Fluid intelligence is associated with cortical volume and white matter tract integrity within multiple-demand system across adult lifespan (2020) (21)
- Towards Certificated Model Robustness Against Weight Perturbations (2020) (21)
- Universal Phase Transition in Community Detectability under a Stochastic Block Model (2014) (21)
- Why Lottery Ticket Wins? A Theoretical Perspective of Sample Complexity on Pruned Neural Networks (2021) (20)
- Diffusion Models for Information Dissemination Dynamics in Wireless Complex Communication Networks (2013) (20)
- On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples (2018) (20)
- Leveraging Latent Features for Local Explanations (2019) (20)
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (2020) (20)
- Optimizing Mode Connectivity via Neuron Alignment (2020) (19)
- QTN-VQC: An End-to-End Learning framework for Quantum Neural Networks (2021) (19)
- Enhanced Adversarial Strategically-Timed Attacks Against Deep Reinforcement Learning (2020) (19)
- On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning (2021) (19)
- On the Limitation of MagNet Defense Against L1-Based Adversarial Examples (2018) (18)
- Diminution of context association memory structure in subjects with subjective cognitive decline (2018) (18)
- Fast Incremental von Neumann Graph Entropy Computation: Theory, Algorithm, and Applications (2018) (18)
- Analysis of Data Dissemination and Control in Social Internet of Vehicles (2018) (18)
- Sequential Defense Against Random and Intentional Attacks in Complex Networks (2015) (18)
- Accelerated Distributed Dual Averaging Over Evolving Networks of Growing Connectivity (2017) (18)
- Analysis of Information Delivery Dynamics in Cognitive Sensor Networks Using Epidemic Models (2017) (17)
- When Causal Intervention Meets Adversarial Examples and Image Masking for Deep Neural Networks (2019) (17)
- Fast Learning of Graph Neural Networks with Guaranteed Generalizability: One-hidden-layer Case (2020) (16)
- Towards Verifying Robustness of Neural Networks Against Semantic Perturbations (2019) (15)
- Learning Graph Topological Features via GAN (2017) (15)
- Ecology of Cognitive Radio Ad Hoc Networks (2011) (15)
- Optimal Control of Epidemic Information Dissemination in Mobile Ad Hoc Networks (2011) (14)
- Incremental Method for Spectral Clustering of Increasing Orders (2015) (14)
- Bias-Variance Tradeoff of Graph Laplacian Regularizer (2017) (14)
- Causal Inference Q-Network: Toward Resilient Reinforcement Learning (2021) (13)
- Microstructural differences in white matter tracts across middle to late adulthood: a diffusion MRI study on 7167 UK Biobank participants (2020) (13)
- Phase Transitions and a Model Order Selection Criterion for Spectral Graph Clustering (2016) (13)
- Adversarial Attack Generation Empowered by Min-Max Optimization (2019) (12)
- Action Recommendation for Cyber Resilience (2015) (12)
- Hidden Cost of Randomized Smoothing (2021) (12)
- Towards Mitigating Audio Adversarial Perturbations (2018) (12)
- Incremental eigenpair computation for graph Laplacian matrices: theory and applications (2017) (12)
- Decapitation via digital epidemics: a bio-inspired transmissive attack (2016) (12)
- Model Reprogramming: Resource-Efficient Cross-Domain Machine Learning (2022) (12)
- Intentional Attack and Fusion-Based Defense Strategy in Complex Networks (2011) (12)
- Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines (2021) (11)
- Revisiting Spectral Graph Clustering with Generative Community Models (2017) (11)
- Network synchronization among femtocells (2011) (11)
- An Information-Theoretic Perspective on the Relationship Between Fairness and Accuracy (2019) (11)
- Curse or Redemption? How Data Heterogeneity Affects the Robustness of Federated Learning (2021) (11)
- Accelerating Antimicrobial Discovery with Controllable Deep Generative Models and Molecular Dynamics (2020) (11)
- Reciprocal spectrum sharing game and mechanism in cellular systems with Cognitive Radio users (2011) (10)
- Distributed Adversarial Training to Robustify Deep Neural Networks at Scale (2022) (10)
- Genome Architecture Leads a Bifurcation in Cell Identity (2017) (10)
- Formalizing Generalization and Robustness of Neural Networks to Weight Perturbations (2021) (9)
- How does unlabeled data improve generalization in self-training? A one-hidden-layer theoretical analysis (2022) (9)
- Improved Linear Convergence of Training CNNs With Generalizability Guarantees: A One-Hidden-Layer Case (2020) (9)
- Heterogeneous Aging Effects on Functional Connectivity in Different Cortical Regions: A Resting-State Functional MRI Study Using Functional Data Analysis (2016) (9)
- Identifying Influential Links for Event Propagation on Twitter: A Network of Networks Approach (2016) (8)
- Reprogramming Language Models for Molecular Representation Learning (2020) (8)
- Rethinking Randomized Smoothing for Adversarial Robustness (2020) (8)
- A scalable attribute-aware network embedding system (2019) (8)
- Rate–Reliability–Delay Tradeoff of Multipath Transmission Using Network Coding (2012) (8)
- Revisiting Contrastive Learning through the Lens of Neighborhood Component Analysis: an Integrated Framework (2021) (7)
- AI explainability 360: hands-on tutorial (2020) (7)
- Holistic Adversarial Robustness of Deep Learning Models (2022) (7)
- Self-Progressing Robust Training (2020) (7)
- Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning (2021) (6)
- ON EXTENSIONS OF CLEVER: A NEURAL NETWORK ROBUSTNESS EVALUATION ALGORITHM (2018) (6)
- Multilayer spectral graph clustering via convex layer aggregation (2016) (6)
- FEAST: An Automated Feature Selection Framework for Compilation Tasks (2016) (6)
- Reinforcement learning based interconnection routing for adaptive traffic optimization (2019) (6)
- Robust Text CAPTCHAs Using Adversarial Examples (2021) (6)
- Can GAN Learn Topological Features of a Graph? (2017) (6)
- Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations (2021) (6)
- A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction (2022) (6)
- Fast Training of Provably Robust Neural Networks by SingleProp (2021) (6)
- How and When Adversarial Robustness Transfers in Knowledge Distillation? (2021) (5)
- Modeling Dynamics of Malware with Incubation Period from the View of Individual (2014) (5)
- Training a Resilient Q-network against Observational Interference (2021) (5)
- Predicting Deep Neural Network Generalization with Perturbation Response Curves (2021) (5)
- Towards an Efficient and General Framework of Robust Training for Graph Neural Networks (2020) (5)
- Beyond Adversarial Training: Min-Max Optimization in Adversarial Attack and Defense (2019) (5)
- On the Supermodularity of Active Graph-Based Semi-Supervised Learning with Stieltjes Matrix Regularization (2018) (5)
- When Causal Intervention Meets Image Masking and Adversarial Perturbation for Deep Neural Networks (2019) (5)
- SChME at SemEval-2020 Task 1: A Model Ensemble for Detecting Lexical Semantic Change (2020) (4)
- Visual Prompting for Adversarial Robustness (2022) (4)
- Guaranteed Convergence of Training Convolutional Neural Networks via Accelerated Gradient Descent (2020) (4)
- Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach (2019) (4)
- hpGAT: High-Order Proximity Informed Graph Attention Network (2019) (4)
- AI Explainability 360 Toolkit (2020) (4)
- Towards Compositional Adversarial Robustness: Generalizing Adversarial Training to Composite Semantic Perturbations (2022) (4)
- AMOS: An automated model order selection algorithm for spectral graph clustering (2016) (4)
- FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning (2022) (4)
- Supervised Collective Classification for Crowdsourcing (2015) (4)
- Fake it Till You Make it: Self-Supervised Semantic Shifts for Monolingual Word Embedding Tasks (2021) (4)
- Generalization Guarantee of Training Graph Convolutional Networks with Graph Topology Sampling (2022) (4)
- TemPEST: Soft Template-Based Personalized EDM Subject Generation through Collaborative Summarization (2020) (4)
- Pessimistic Model Selection for Offline Deep Reinforcement Learning (2021) (4)
- Guest Editorial Special Issue on AI Enabled Cognitive Communication and Networking for IoT (2019) (4)
- Dynamic Network Analysis of the 4D Nucleome (2018) (4)
- Recent Progress in Zeroth Order Optimization and Its Applications to Adversarial Robustness in Data Mining and Machine Learning (2019) (3)
- FIRST-ORDER BIFURCATION DETECTION FOR DYNAMIC COMPLEX NETWORKS (2018) (3)
- Toward A Neuro-inspired Creative Decoder (2019) (3)
- Adversarial Examples for Unsupervised Machine Learning Models (2021) (3)
- Auto-Transfer: Learning to Route Transferrable Representations (2022) (3)
- Zeroth-Order Optimization for Composite Problems with Functional Constraints (2021) (3)
- Real-World Adversarial Examples Via Makeup (2022) (3)
- Understanding and Improving Visual Prompting: A Label-Mapping Perspective (2022) (3)
- High-Robustness, Low-Transferability Fingerprinting of Neural Networks (2021) (3)
- MAML is a Noisy Contrastive Learner in Classification (2021) (2)
- Poster : REMIX : Mitigating Adversarial Perturbation by Reforming , Masking and Inpainting (2018) (2)
- Block Switching: A Stochastic Approach for Deep Learning Security (2020) (2)
- Zeroth-Order Diffusion Adaptation Over Networks (2018) (2)
- Ecology-Based DoS Attack in Cognitive Radio Networks (2016) (2)
- Non-Singular Adversarial Robustness of Neural Networks (2021) (2)
- AdvMS: A Multi-Source Multi-Cost Defense Against Adversarial Attacks (2020) (2)
- F1 ATP synthase β subunit is a putative receptor involved in white spot syndrome virus infection in shrimp by binding with viral envelope proteins VP51B and VP150. (2020) (2)
- Neural Clamping: Joint Input Perturbation and Temperature Scaling for Neural Network Calibration (2022) (2)
- Buffer Occupancy and Delivery Reliability Tradeoffs for Epidemic Routing (2016) (2)
- Malware Propagation and Control in Internet of Things (2016) (2)
- Mean-based Best Arm Identification in Stochastic Bandits under Reward Contamination (2021) (2)
- Meta Federated Learning (2021) (2)
- MAML is a Noisy Contrastive Learner (2021) (2)
- Zeroth-Order Hybrid Gradient Descent: Towards A Principled Black-Box Optimization Framework (2020) (2)
- Distributed optimization for evolving networks of growing connectivity (2017) (2)
- Phase transitions in spectral community detection of large noisy networks (2015) (2)
- When Does Backdoor Attack Succeed in Image Reconstruction? A Study of Heuristics vs. Bi-Level Solution (2022) (2)
- Topology control in multi-channel cognitive radio networks with non-uniform node arrangements (2011) (2)
- Gi and Pal Scores: Deep Neural Network Generalization Statistics (2021) (2)
- IS ORDERED WEIGHTED ℓ1 REGULARIZED REGRESSION ROBUST TO ADVERSARIAL PERTURBATION? A CASE STUDY ON OSCAR (2018) (2)
- Towards creativity characterization of generative models via group-based subset scanning (2021) (2)
- On the Effectiveness of Poisoning against Unsupervised Domain Adaptation (2021) (1)
- A Spectral View of Randomized Smoothing Under Common Corruptions: Benchmarking and Improving Certified Robustness (2022) (1)
- ON THE UTILITY OF CONDITIONAL GENERATION BASED MUTUAL INFORMATION FOR CHARACTERIZING ADVERSARIAL SUBSPACES (2018) (1)
- Neural-Brane: An inductive approach for attributed network embedding (2019) (1)
- Controllability, Multiplexing, and Transfer Learning in Networks using Evolutionary Learning (2018) (1)
- Neural Capacitance: A New Perspective of Neural Network Selection via Edge Dynamics (2022) (1)
- Considering Angle Selection When Using Ultrasound Electrode Displacement Elastography to Evaluate Radiofrequency Ablation of Tissues (2014) (1)
- Generalizing Adversarial Training to Composite Semantic Perturbations (2021) (1)
- DEMO: Action Recommendation for Cyber Resilience (2015) (1)
- A Dynamical Systems Approach for Convergence of the Bayesian EM Algorithm (2020) (1)
- Adversarial Sample Enhanced Domain Adaptation: A Case Study on Predictive Modeling with Electronic Health Records (2021) (1)
- CARBEN: Composite Adversarial Robustness Benchmark (2022) (1)
- Improving Prediction Efficacy Through Abnormality Detection and Data Preprocessing (2019) (1)
- Meta Adversarial Perturbations (2021) (1)
- On Certifying and Improving Generalization to Unseen Domains (2022) (1)
- Don't Forget to Sign the Gradients! (2021) (1)
- Third Workshop on Adversarial Learning Methods for Machine Learning and Data Mining (AdvML 2021) (2021) (1)
- L1-BASED ADVERSARIAL EXAMPLES (2018) (1)
- An objective autoselection of resting-state networks based on time course correlation (2011) (1)
- Multimodal Brain Age Gap as a Mediating Indicator in the Relation between Modifiable Dementia Risk Factors and Cognitive Functioning (2020) (1)
- Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning (2021) (1)
- Linearity Grafting: Relaxed Neuron Pruning Helps Certifiable Robustness (2022) (1)
- Author Correction: Accelerated antimicrobial discovery via deep generative models and molecular dynamics simulations (2021) (1)
- Joint Edge-Model Sparse Learning is Provably Efficient for Graph Neural Networks (2023) (1)
- Visual Interpretability Alone Helps Adversarial Robustness (2019) (1)
- Supplementary Material for Zeroth-Order Online Alternating Direction Method of Multipliers : Convergence Analysis and Applications (2018) (1)
- Multivariate and Categorical Analysis of Gaming Statistics (2015) (0)
- Evaluating the Adversarial Robustness for Fourier Neural Operators (2022) (0)
- Characterizing Adversarial Subspaces by Mutual Information (2019) (0)
- Network Graph Based Neural Architecture Search (2021) (0)
- AID: Attesting the Integrity of Deep Neural Networks (2021) (0)
- An Empirical Evaluation of Zeroth-Order Optimization Methods on AI-driven Molecule Optimization (2022) (0)
- Certified Interpretability Robustness for Class Activation Mapping (2023) (0)
- GERPRINTING OF NEURAL NETWORKS (2021) (0)
- The Fourth Workshop on Adversarial Learning Methods for Machine Learning and Data Mining (AdvML 2022) (2022) (0)
- Real-World Adversarial Examples involving Makeup Application (2021) (0)
- Overload: Latency Attacks on Object Detection for Edge Devices (2023) (0)
- Stealthy Poisoning Attack on Certified Robustness (2020) (0)
- Editorial: Safe and Trustworthy Machine Learning (2021) (0)
- Attack, Defense, and Network Robustness of Internet of Things (2016) (0)
- Mild to moderate levels of anxiety in a healthy population cohort are related to face recognition with negative emotions and white matter integrity (2020) (0)
- Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples (2021) (0)
- Corrections to "Learning Graph Topological Features via GAN" (2019) (0)
- WORKS: AN EXTREME VALUE THEORY APPROACH (2018) (0)
- Optimizing Loss Landscape Connectivity via Neuron Alignment (2019) (0)
- Sieve Estimators: Consistency and Rates of Convergence (2014) (0)
- GREAT Score: Global Robustness Evaluation of Adversarial Perturbation using Generative Models (2023) (0)
- Toward Cyber-Resiliency Metrics for Action Recommendations Against Lateral Movement Attacks (2019) (0)
- Analysis and Actions on Graph Data. (2016) (0)
- AutoZOOM : Background and Methods 3 . 1 Black-box Attack Formulation and Zeroth Order Optimization (2019) (0)
- INTERHEMISPHERIC STRUCTURAL AND FUNCTIONAL CONNECTIVITIES SHOW DISTINCT STRENGTHS OF ASSOCIATIONS IN HOMOTOPIC AND HETEROTOPIC CONNECTIONS (2012) (0)
- Domain Adaptation for Learning Generator From Paired Few-Shot Data (2021) (0)
- SPROUT: Self-Progressing Robust Training (2019) (0)
- OPTIMIZATION FOR EVOLVING NETWORKS OF GROWING CONNECTIVITY (2017) (0)
- Simple Transparent Adversarial Examples (2021) (0)
- Active Estimation From Multimodal Data (2021) (0)
- EAD : Elastic-Net Attacks to DNNs Preliminaries on Elastic-Net Regularization (2018) (0)
This paper list is powered by the following services: