no code implementations • 24 Jan 2024 • Junlin Liu, Xinchen Lyu
Adversarial examples are one critical security threat to various visual applications, where injected human-imperceptible perturbations can confuse the output. Generating transferable adversarial examples in the black-box setting is crucial but challenging in practice.
no code implementations • 22 Mar 2022 • Yuyuan Li, Xiaolin Zheng, Chaochao Chen, Junlin Liu
The basic idea of most recommender systems is collaborative filtering, but existing MU methods ignore the collaborative information across users and items.
no code implementations • 10 Mar 2022 • Junlin Liu, Xinchen Lyu, Qimei Cui, Xiaofeng Tao
We mathematically analyze the potential label leakages and propose the cosine and Euclidean similarity measurements for gradients and smashed data, respectively.
no code implementations • 18 Oct 2021 • Zhe Zhou, Junlin Liu, Zhenyu Gu, Guangyu Sun
To enable such an algorithm with lower latency and better energy efficiency, we also propose an Energon co-processor architecture.