フォロー
Hanxun Huang
タイトル
引用先
引用先
Normalized Loss Functions for Deep Learning with Noisy Labels
X Ma, H Huang, Y Wang, S Romano, S Erfani, J Bailey
International Conference on Machine Learning (ICML), 2020
5242020
Unlearnable Examples: Making Personal Data Unexploitable
H Huang, X Ma, SM Erfani, J Bailey, Y Wang
International Conference on Learning Representations (ICLR), 2021
2032021
Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
H Huang, Y Wang, SM Erfani, Q Gu, J Bailey, X Ma
Advances in Neural Information Processing Systems (NeurIPS), 2021
1182021
Distilling Cognitive Backdoor Patterns within an Image
H Huang, X Ma, S Erfani, J Bailey
International Conference on Learning Representations (ICLR), 2023
322023
Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness
X Ma, L Jiang, H Huang, Z Weng, J Bailey, YG Jiang
Machine Learning, 2023
252023
Backdoorllm: A comprehensive benchmark for backdoor attacks on large language models
Y Li, H Huang, Y Zhao, X Ma, J Sun
arXiv preprint arXiv:2408.12798, 2024
172024
Shortcuts Everywhere and Nowhere: Exploring Multi-Trigger Backdoor Attacks
Y Li, J He, H Huang, J Sun, X Ma
arXiv e-prints, arXiv: 2401.15295, 2024
10*2024
LDReg: Local Dimensionality Regularized Self-Supervised Learning
H Huang, RJGB Campello, SM Erfani, X Ma, ME Houle, J Bailey
International Conference on Learning Representations (ICLR), 2024
72024
Neural Architecture Search via Combinatorial Multi-Armed Bandit
H Huang, X Ma, SM Erfani, J Bailey
International Joint Conference on Neural Networks (IJCNN), 2021
72021
Expose before you defend: Unifying and enhancing backdoor defenses via exposed models
Y Li, H Huang, J Zhang, X Ma, YG Jiang
arXiv preprint arXiv:2410.19427, 2024
32024
Detecting Backdoor Samples in Contrastive Language Image Pretraining
H Huang, S Erfani, Y Li, X Ma, J Bailey
International Conference on Learning Representations (ICLR), 2025
22025
Safety at Scale: A Comprehensive Survey of Large Model Safety
X Ma, Y Gao, Y Wang, R Wang, X Wang, Y Sun, Y Ding, H Xu, Y Chen, ...
arXiv preprint arXiv:2502.05206, 2025
12025
Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
W Zheng, X Ma, H Huang, Z Wu, YG Jiang
arXiv preprint arXiv:2408.01705, 2024
12024
CURVALID: Geometrically-guided Adversarial Prompt Detection
C Yung, H Huang, SM Erfani, C Leckie
arXiv preprint arXiv:2503.03502, 2025
2025
Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Y Xie, W Zheng, H Huang, G Ye, X Ma
The IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2025
2025
Bayesian Estimation Approaches for Local Intrinsic Dimensionality
JB Zaher Joukhadar, Hanxun Huang, Sarah M. Erfani, Ricardo J. G. B. Campello ...
Similarity Search and Applications: 17th International Conference, SISAP …, 2024
2024
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–16