
ElasticInfoGAN: Unsupervised Disentangled Representation Learning in Imbalanced Data
We propose a novel unsupervised generative model, ElasticInfoGAN, that ...
read it

LargeBatch Training for LSTM and Beyond
Largebatch training approaches have enabled researchers to utilize larg...
read it

The Limitations of Adversarial Training and the BlindSpot Attack
The adversarial training procedure proposed by Madry et al. (2018) is on...
read it

Toward Finding The Global Optimal of Adversarial Examples
Current machine learning models are vulnerable to adversarial examples (...
read it

Reducing BERT PreTraining Time from 3 Days to 76 Minutes
Largebatch training is key to speeding up deep neural network training ...
read it

Learning to Learn by ZerothOrder Oracle
In the learning to learn (L2L) framework, we cast the design of optimiza...
read it

SignOPT: A QueryEfficient Hardlabel Adversarial Attack
We study the most practical problem setup for evaluating adversarial rob...
read it

Stochastic Shared Embeddings: Datadriven Regularization of Embedding Layers
In deep neural nets, lower level embedding layers account for a large po...
read it

VisualBERT: A Simple and Performant Baseline for Vision and Language
We propose VisualBERT, a simple and flexible framework for modeling a br...
read it

Automatic Perturbation Analysis on General Computational Graphs
Linear relaxation based perturbation analysis for neural networks, which...
read it

Neural SDE: Stabilizing Neural ODE Networks with Stochastic Noise
Neural Ordinary Differential Equation (Neural ODE) has been proposed as ...
read it

Stabilizing Differentiable Architecture Search via Perturbationbased Regularization
Differentiable architecture search (DARTS) is a prevailing NAS solution ...
read it

Robustness Verification for Transformers
Robustness verification that aims to formally certify the prediction beh...
read it

QueryEfficient Hardlabel Blackbox Attack:An Optimizationbased Approach
We study the problem of attacking a machine learning model in the hardl...
read it

Efficient Neural Network Robustness Certification with General Activation Functions
Finding minimum distortion of adversarial examples and thus certifying r...
read it

AutoZOOM: Autoencoderbased Zeroth Order Optimization Method for Attacking Blackbox Neural Networks
Recent studies have shown that adversarial examples in stateoftheart ...
read it

Temporal Collaborative Ranking Via Personalized Transformer
The collaborative ranking problem has been an important open research qu...
read it

MACER: Attackfree and Scalable Robust Training via Maximizing Certified Radius
Adversarial training is one of the most popular ways to learn robust mod...
read it

CAT: Customized Adversarial Training for Improved Robustness
Adversarial training has become one of the most effective methods for im...
read it

MLLOO: Detecting Adversarial Examples with Feature Attribution
Deep neural networks obtain stateoftheart performance on a series of ...
read it

Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Neural language models have been widely used in various NLP tasks, inclu...
read it

EAD: ElasticNet Attacks to Deep Neural Networks via Adversarial Examples
Recent studies have highlighted the vulnerability of deep neural network...
read it

ImageNet Training in Minutes
Finishing 90epoch ImageNet1k training with ResNet50 on a NVIDIA M40 G...
read it

ZOO: Zeroth Order Optimization based Blackbox Attacks to Deep Neural Networks without Training Substitute Models
Deep neural networks (DNNs) are one of the most prominent technologies o...
read it

GPUacceleration for Largescale Tree Boosting
In this paper, we present a novel massively parallel algorithm for accel...
read it

Can Decentralized Algorithms Outperform Centralized Algorithms? A Case Study for Decentralized Parallel Stochastic Gradient Descent
Most distributed machine learning systems nowadays, including TensorFlow...
read it

ShowandFool: Crafting Adversarial Examples for Neural Image Captioning
Modern neural image captioning systems typically adopt the encoderdecod...
read it

PU Learning for Matrix Completion
In this paper, we consider the matrix completion problem when the observ...
read it

Sparse Inverse Covariance Matrix Estimation Using Quadratic Approximation
The L1regularized Gaussian maximum likelihood estimator (MLE) has been ...
read it

Towards Robust Neural Networks via Random Selfensemble
Recent studies have revealed the vulnerability of deep neural networks ...
read it

History PCA: A New Algorithm for Streaming PCA
In this paper we propose a new algorithm for streaming principal compone...
read it

Seq2Sick: Evaluating the Robustness of SequencetoSequence Models with Adversarial Examples
Crafting adversarial examples has become an important technique to evalu...
read it

Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach
The robustness of neural networks to adversarial examples has received g...
read it

Graphic displays of MLB pitching mechanics and its evolutions in PITCHf/x data
Systemic and idiosyncratic patterns in pitching mechanics of 24 top star...
read it

LearningWord Embeddings for Lowresource Languages by PU Learning
Word embedding is a key component in many downstream applications in pro...
read it

Towards Fast Computation of Certified Robustness for ReLU Networks
Verifying the robustness property of a general Rectified Linear Unit (Re...
read it

Stochastic Zerothorder Optimization via Variance Reduction method
Derivativefree optimization has become an important technique used in m...
read it

SQLRank: A Listwise Approach to Collaborative Ranking
In this paper, we propose a listwise approach for constructing userspec...
read it

Accurate, Fast and Scalable Kernel Ridge Regression on Parallel and Distributed Systems
We propose two new methods to address the weak scaling problems of KRR: ...
read it

An inexact subsampled proximal Newtontype method for largescale machine learning
We propose a fast proximal Newtontype algorithm for minimizing regulari...
read it

Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data
We present a probabilistic framework for studying adversarial attacks on...
read it

GroupReduce: BlockWise LowRank Approximation for Neural Language Model Shrinking
Model compression is essential for serving large deep neural nets on dev...
read it

From Adversarial Training to Generative Adversarial Networks
In this paper, we are interested in two seemingly different concepts: ad...
read it

Fast Variance Reduction Method with Stochastic Batch Size
In this paper we study a family of variance reduction methods with rando...
read it

Stochastically Controlled Stochastic Gradient for the Convex and Nonconvex Composition problem
In this paper, we consider the convex and nonconvex composition problem...
read it

Stochastic Secondorder Methods for Nonconvex Optimization with Inexact Hessian and Gradient
Trust region and cubic regularization methods have demonstrated good per...
read it

Attack Graph Convolutional Networks by Adding Fake Nodes
Graph convolutional networks (GCNs) have been widely used for classifyin...
read it

RedSync : Reducing Synchronization Traffic for Distributed Deep Learning
Data parallelism has already become a dominant method to scale Deep Neur...
read it

Blockwise Partitioning for Extreme Multilabel Classification
Extreme multilabel classification aims to learn a classifier that annot...
read it

RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
The Jacobian matrix (or the gradient for singleoutput networks) is dire...
read it
ChoJui Hsieh
is this you? claim profile
Assistant professor of Computer Science and Statistics at UC Davis