Pin-Yu Chen
Pin-Yu Chen
Research Staff Member, IBM Research AI; MIT-IBM Watson AI Lab; RPI-IBM AIRC
Verified email at - Homepage
Cited by
Cited by
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
PY Chen, H Zhang, Y Sharma, J Yi, CJ Hsieh
ACM CCS Workshop on AI and Security, 2017
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
PY Chen, Y Sharma, H Zhang, J Yi, CJ Hsieh
AAAI 2018, 2017
Smart attacks in smart grid communication networks
PY Chen, SM Cheng, KC Chen
IEEE Communications Magazine 50 (8), 24-29, 2012
Efficient Neural Network Robustness Certification with General Activation Functions
H Zhang, TW Weng, PY Chen, CJ Hsieh, L Daniel
NeurIPS 2018, 2018
On modeling malware propagation in generalized social networks
SM Cheng, WC Ao, PY Chen, KC Chen
IEEE Communications Letters 15 (1), 25-27, 2011
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach
TW Weng, H Zhang, PY Chen, J Yi, D Su, Y Gao, CJ Hsieh, L Daniel
ICLR 2018, 2018
Is Robustness the Cost of Accuracy?--A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
D Su, H Zhang, H Chen, J Yi, PY Chen, Y Gao
ECCV 2018, 2018
Query-efficient hard-label black-box attack: An optimization-based approach
M Cheng, T Le, PY Chen, J Yi, H Zhang, CJ Hsieh
ICLR 2019, 2018
AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking Black-box Neural Networks
CC Tu, P Ting, PY Chen, S Liu, H Zhang, J Yi, CJ Hsieh, SM Cheng
AAAI 2019 (oral presentation), 2018
Explanations based on the Missing: Towards Contrastive Explanations with Pertinent Negatives
A Dhurandhar, PY Chen, R Luss, CC Tu, P Ting, K Shanmugam, P Das
NeurIPS 2018, 2018
Attacking visual language grounding with adversarial examples: A case study on neural image captioning
H Chen, H Zhang, PY Chen, J Yi, CJ Hsieh
ACL 2018 (Long Papers) 1, 2587-2597, 2018
Information Fusion to Defend Intentional Attack in Internet of Things
PY Chen, SM Cheng, KC Chen
IEEE Internet of Things Journal, 2014
Seq2sick: Evaluating the robustness of sequence-to-sequence models with adversarial examples
M Cheng, J Yi, H Zhang, PY Chen, CJ Hsieh
AAAI 2020, 2018
Optimal Control of Epidemic Information Dissemination Over Networks
PY Chen, SM Cheng, KC Chen
IEEE Transactions on Cybernetics, 2014
Attacking the Madry defense model with -based adversarial examples
Y Sharma, PY Chen
ICLR 2018 Workshop, 2017
Structured Adversarial Attack: Towards General Implementation and Better Interpretability
K Xu, S Liu, P Zhao, PY Chen, H Zhang, D Erdogmus, Y Wang, X Lin
ICLR 2019, 2018
Deep Community Detection
PY Chen, AO Hero
IEEE Transactions on Signal Processing, 2014
Zeroth-Order Stochastic Variance Reduction for Nonconvex Optimization
S Liu, B Kailkhura, PY Chen, P Ting, S Chang, L Amini
NeurIPS 2018, 2018
Information epidemics in complex networks with opportunistic links and dynamic topology
PY Chen, KC Chen
IEEE GLOBECOM 2010, 1-6, 2010
Zeroth-Order Online Alternating Direction Method of Multipliers: Convergence Analysis and Applications
S Liu, J Chen, PY Chen, AO Hero
AISTATS 2018, 2017
The system can't perform the operation now. Try again later.
Articles 1–20