1 code implementation • 23 Apr 2022 • Yujin Huang, Chunyang Chen
We evaluate the attack effectiveness and generality in terms of four different settings including pre-trained models, datasets, transfer learning approaches and adversarial attack algorithms.
1 code implementation • 12 Jan 2021 • Yujin Huang, Han Hu, Chunyang Chen
Deep learning has shown its power in many applications, including object detection in images, natural-language understanding, and speech recognition.