Vision transformers (ViTs) are quickly becoming the de-facto architectur...
We introduce adaptive weight decay, which automatically tunes the
hyper-...
Existing techniques for model inversion typically rely on hard-to-tune
r...
Data poisoning and backdoor attacks manipulate training data to induce
s...
Data poisoning and backdoor attacks manipulate victim models by maliciou...
When large scale training data is available, one can obtain compact and
...
To deflect adversarial attacks, a range of "certified" classifiers have ...
Adversarial training is one of the strongest defenses against adversaria...
Transfer learning, in which a network is trained on one task and re-purp...
Adversarial training, in which a network is trained on adversarial examp...