no code implementations • 25 May 2024 • Chunlin Qiu, Yiheng Duan, Lingchen Zhao, Qian Wang
Transfer-based attacks craft adversarial examples utilizing a white-box surrogate model to compromise various black-box target models, posing significant threats to many real-world applications.
no code implementations • 14 Oct 2022 • Ziyang Tang, Yiheng Duan, Stephanie Zhang, Lihong Li
Randomized experiments (a. k. a.
no code implementations • 11 Aug 2022 • Yufei Bo, Yiheng Duan, Shuo Shao, Meixia Tao
The intrinsic mechanism of neural network based digital modulation is mapping continuous output of the neural network encoder into discrete constellation symbols, which is a non-differentiable function that cannot be trained with existing gradient descend algorithms.