Xi Wu
Xi Wu
Email verificata su google.com - Home page
Titolo
Citata da
Citata da
Anno
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
Security and Privacy (SP), 2016 IEEE Symposium on, 582-597, 2016
14482016
Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics
X Wu, F Li, A Kumar, K Chaudhuri, S Jha, JF Naughton
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
103*2017
COREMU: a Scalable and Portable Parallel Full-System Emulator
Z Wang, R Liu, Y Chen, X Wu, H Chen, W Zhang, B Zang
ACM SIGPLAN Notices 46 (8), 213-222, 2011
712011
Weak Compositions and Their Applications to Polynomial Lower Bounds for Kernelization
D Hermelin, X Wu
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete …, 2012
652012
A Methodology for Modeling Model-Inversion Attacks
X Wu, M Fredrikson, S Jha, JF Naughton
Computer Security Foundations Symposium (CSF), 2016 IEEE 29th, 355-370, 2016
57*2016
A Completeness Theory for Polynomial (Turing) Kernelization
D Hermelin, S Kratsch, K Sołtys, M Wahlström, X Wu
Algorithmica 71 (3), 702-730, 2015
492015
From Speculation to Security: Practical and Efficient Information Flow Tracking using Speculative Hardware
H Chen, X Wu, L Yuan, B Zang, P Yew, FT Chong
Computer Architecture, 2008. ISCA'08. 35th International Symposium on, 401-412, 2008
482008
Control Flow Obfuscation with Information Flow Tracking
H Chen, L Yuan, X Wu, B Zang, B Huang, P Yew
Proceedings of the 42nd Annual IEEE/ACM International Symposium on …, 2009
432009
Objective metrics and gradient descent algorithms for adversarial examples in machine learning
U Jang, X Wu, S Jha
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
362017
Uncertainty Aware Query Execution Time Prediction
W Wu, X Wu, H Hacigümüş, JF Naughton
Proceedings of the VLDB Endowment 7 (14), 1857-1868, 2014
312014
Revisiting Differentially Private Regression: Lessons from Learning Theory and Their Consequences
X Wu, M Fredrikson, W Wu, S Jha, JF Naughton
arXiv preprint arXiv:1512.06388, 2015
252015
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
J Chen, X Wu, Y Liang, S Jha
arXiv preprint arXiv:1805.07816, 2018
17*2018
Concise Explanations for Neural Networks using Adversarial Training
P Chalasani, J Chen, S Jha, X Wu
arXiv preprint arXiv:1810.06583, 2018
16*2018
Hierarchies of Inefficient Kernelizability
D Hermelin, S Kratsch, K Sołtys, M Wahlström, X Wu
arXiv preprint arXiv:1110.0976, 2011
152011
Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training
X Wu, U Jang, J Chen, L Chen, S Jha
Proceedings of the 35th International Conference on Machine Learning 80 …, 2018
13*2018
When lempel-ziv-welch meets machine learning: A case study of accelerating machine learning using coding
F Li, L Chen, A Kumar, JF Naughton, JM Patel, X Wu
arXiv preprint arXiv:1702.06943, 2017
9*2017
Extended Islands of Tractability for Parsimony Haplotyping
R Fleischer, J Guo, R Niedermeier, J Uhlmann, Y Wang, M Weller, X Wu
Annual Symposium on Combinatorial Pattern Matching, 214-226, 2010
92010
Experimental Study of FPT Algorithms for the Directed Feedback Vertex Set Problem
R Fleischer, X Wu, L Yuan
European Symposium on Algorithms, 611-622, 2009
82009
Robust attribution regularization
J Chen, X Wu, V Rastogi, Y Liang, S Jha
Advances in Neural Information Processing Systems, 14300-14310, 2019
72019
Robust Out-of-distribution Detection in Neural Networks
J Chen, X Wu, Y Liang, S Jha
arXiv preprint arXiv:2003.09711, 2020
62020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20