Topology attack and defense for graph neural networks: An optimization perspective K Xu, H Chen, S Liu, PY Chen, TW Weng, M Hong, X Lin arXiv preprint arXiv:1906.04214, 2019 | 399 | 2019 |
Adversarial t-shirt! evading person detectors in a physical world K Xu, G Zhang, S Liu, Q Fan, M Sun, H Chen, PY Chen, Y Wang, X Lin Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020 | 324 | 2020 |
CirCNN: accelerating and compressing deep neural networks using block-circulant weight matrices C Ding, S Liao, Y Wang, Z Li, N Liu, Y Zhuo, C Wang, X Qian, Y Bai, ... Proceedings of the 50th Annual IEEE/ACM International Symposium on …, 2017 | 317 | 2017 |
Feature distillation: Dnn-oriented jpeg compression against adversarial examples Z Liu, Q Liu, T Liu, N Xu, X Lin, Y Wang, W Wen 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR …, 2019 | 270 | 2019 |
Task scheduling with dynamic voltage and frequency scaling for energy minimization in the mobile cloud computing environment X Lin, Y Wang, Q Xie, M Pedram IEEE Transactions on Services Computing 8 (2), 175-186, 2014 | 266 | 2014 |
Patdnn: Achieving real-time dnn execution on mobile devices with pattern-based weight pruning W Niu, X Ma, S Lin, S Wang, X Qian, X Lin, Y Wang, B Ren Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 250 | 2020 |
Automatic perturbation analysis for scalable certified robustness and beyond K Xu, Z Shi, H Zhang, Y Wang, KW Chang, M Huang, B Kailkhura, X Lin, ... Advances in Neural Information Processing Systems 33, 1129-1141, 2020 | 240 | 2020 |
Beta-crown: Efficient bound propagation with per-neuron split constraints for neural network robustness verification S Wang, H Zhang, K Xu, X Lin, S Jana, CJ Hsieh, JZ Kolter Advances in Neural Information Processing Systems 34, 29909-29921, 2021 | 205 | 2021 |
Admm-nn: An algorithm-hardware co-design framework of dnns using alternating direction methods of multipliers A Ren, T Zhang, S Ye, J Li, W Xu, X Qian, X Lin, Y Wang Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019 | 198 | 2019 |
Bridging mode connectivity in loss landscapes and adversarial robustness P Zhao, PY Chen, P Das, KN Ramamurthy, X Lin arXiv preprint arXiv:2005.00060, 2020 | 197 | 2020 |
Structured adversarial attack: Towards general implementation and better interpretability K Xu, S Liu, P Zhao, PY Chen, H Zhang, Q Fan, D Erdogmus, Y Wang, ... arXiv preprint arXiv:1808.01664, 2018 | 181 | 2018 |
Pconv: The missing but desirable sparsity in dnn weight pruning for real-time execution on mobile devices X Ma, FM Guo, W Niu, X Lin, J Tang, K Ma, B Ren, Y Wang Proceedings of the AAAI conference on artificial intelligence 34 (04), 5117-5124, 2020 | 176 | 2020 |
Adaptive control for energy storage systems in households with photovoltaic modules Y Wang, X Lin, M Pedram IEEE Transactions on Smart Grid 5 (2), 992-1001, 2014 | 167 | 2014 |
Fast and complete: Enabling complete neural network verification with rapid and massively parallel incomplete verifiers K Xu, H Zhang, S Wang, Y Wang, S Jana, X Lin, CJ Hsieh arXiv preprint arXiv:2011.13824, 2020 | 163 | 2020 |
Beta-crown: Efficient bound propagation with per-neuron split constraints for complete and incomplete neural network verification S Wang, H Zhang, K Xu, X Lin, S Jana, CJ Hsieh, JZ Kolter arXiv preprint arXiv:2103.06624 2, 2021 | 133 | 2021 |
A near-optimal model-based control algorithm for households equipped with residential photovoltaic power generation and energy storage systems Y Wang, X Lin, M Pedram IEEE Transactions on Sustainable Energy 7 (1), 77-86, 2015 | 132 | 2015 |
Selective synthesis and device applications of semiconducting single-walled carbon nanotubes using isopropyl alcohol as feedstock Y Che, C Wang, J Liu, B Liu, X Lin, J Parker, C Beasley, HSP Wong, ... Acs Nano 6 (8), 7454-7462, 2012 | 130 | 2012 |
Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack T Sato, J Shen, N Wang, Y Jia, X Lin, QA Chen 30th USENIX security symposium (USENIX Security 21), 3309-3326, 2021 | 127* | 2021 |
Synthesis and device applications of high-density aligned carbon nanotubes using low-pressure chemical vapor deposition and stacked multiple transfer C Wang, K Ryu, LG De Arco, A Badmaev, J Zhang, X Lin, Y Che, C Zhou Nano Research 3, 831-842, 2010 | 105 | 2010 |
Zo-adamm: Zeroth-order adaptive momentum method for black-box optimization X Chen, S Liu, K Xu, X Li, X Lin, M Hong, D Cox Advances in neural information processing systems 32, 2019 | 104 | 2019 |