Name
Papers
Collaborators
XI WU
34
73
Citations 
PageRank 
Referers 
419
26.88
1382
Referees 
References 
770
314
Search Limit
1001000
Title
Citations
PageRank
Year
Towards Evaluating the Robustness of Neural Networks Learned by Transduction00.342022
Person Re-Identification Combined with Style Transfer and Pose Generation00.342022
Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles.00.342021
ATOM: Robustifying Out-of-Distribution Detection Using Outlier Mining10.412021
Tackling Android Fragmentation - Mobile Apps' Dilemma and the Platform's Strategies.00.342020
Concise Explanations of Neural Networks using Adversarial Training00.342020
Enhancing ML Robustness Using Physical-World Constraints.00.342019
Robust Attribution Regularization.00.342019
UTP Semantics of a Calculus for Mobile Ad Hoc Networks.00.342019
Function-Structure Collaborative Mapping Induced by Universal Triple I Systems.00.342019
Generative Adversarial Networks with Enhanced Symmetric Residual Units for Single Image Super-Resolution.00.342019
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks10.362019
That's Mine! Employee Side Projects, Intellectual Property Ownership, and Innovation.00.342019
Improving Adversarial Robustness by Data-Specific Discretization.20.352018
Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training.00.342018
Adversarial Learning and Explainability in Structured Datasets.10.352018
When Lempel-Ziv-Welch Meets Machine Learning: A Case Study of Accelerating Machine Learning using Coding.00.342017
Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics.160.702017
Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning.60.422017
Manifold Assumption and Defenses Against Adversarial Perturbations.00.342017
A Methodology for Formalizing Model-Inversion Attacks80.492016
Differentially Private Stochastic Gradient Descent for in-RDBMS Analytics.50.582016
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks30913.232015
Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences.00.342015
Uncertainty aware query execution time prediction50.412014
Uncertainty Aware Query Execution Time Prediction.00.342014
A Completeness Theory for Polynomial (Turing) Kernelization100.562013
Weak compositions and their applications to polynomial lower bounds for kernelization00.342012
COREMU: a scalable and portable parallel full-system emulator290.962011
Hierarchies of Inefficient Kernelizability40.412011
Extended islands of tractability for parsimony haplotyping30.422010
Experimental Study of FPT Algorithms for the Directed Feedback Vertex Set Problem10.362009
Control flow obfuscation with information flow tracking160.772009
GloSDC: A Framework for a Global Spatial Data Catalog20.362008