Xi Wu
Xi Wu
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
Security and Privacy (SP), 2016 IEEE Symposium on, 582-597, 2016
11762016
Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics
X Wu, F Li, A Kumar, K Chaudhuri, S Jha, JF Naughton
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
75*2017
COREMU: a Scalable and Portable Parallel Full-System Emulator
Z Wang, R Liu, Y Chen, X Wu, H Chen, W Zhang, B Zang
ACM SIGPLAN Notices 46 (8), 213-222, 2011
672011
Weak Compositions and Their Applications to Polynomial Lower Bounds for Kernelization
D Hermelin, X Wu
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete …, 2012
612012
A Completeness Theory for Polynomial (Turing) Kernelization
D Hermelin, S Kratsch, K Sołtys, M Wahlström, X Wu
Algorithmica 71 (3), 702-730, 2015
482015
From Speculation to Security: Practical and Efficient Information Flow Tracking using Speculative Hardware
H Chen, X Wu, L Yuan, B Zang, P Yew, FT Chong
Computer Architecture, 2008. ISCA'08. 35th International Symposium on, 401-412, 2008
462008
Control Flow Obfuscation with Information Flow Tracking
H Chen, L Yuan, X Wu, B Zang, B Huang, P Yew
Proceedings of the 42nd Annual IEEE/ACM International Symposium on …, 2009
422009
A Methodology for Modeling Model-Inversion Attacks
X Wu, M Fredrikson, S Jha, JF Naughton
Computer Security Foundations Symposium (CSF), 2016 IEEE 29th, 355-370, 2016
40*2016
Objective metrics and gradient descent algorithms for adversarial examples in machine learning
U Jang, X Wu, S Jha
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
292017
Uncertainty Aware Query Execution Time Prediction
W Wu, X Wu, H Hacigümüş, JF Naughton
Proceedings of the VLDB Endowment 7 (14), 1857-1868, 2014
292014
Revisiting Differentially Private Regression: Lessons from Learning Theory and Their Consequences
X Wu, M Fredrikson, W Wu, S Jha, JF Naughton
arXiv preprint arXiv:1512.06388, 2015
202015
Hierarchies of Inefficient Kernelizability
D Hermelin, S Kratsch, K Sołtys, M Wahlström, X Wu
arXiv preprint arXiv:1110.0976, 2011
142011
Concise Explanations for Neural Networks using Adversarial Training
P Chalasani, J Chen, S Jha, X Wu
arXiv preprint arXiv:1810.06583, 2018
13*2018
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
J Chen, X Wu, Y Liang, S Jha
arXiv preprint arXiv:1805.07816, 2018
11*2018
Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training
X Wu, U Jang, J Chen, L Chen, S Jha
Proceedings of the 35th International Conference on Machine Learning 80 …, 2018
102018
Extended Islands of Tractability for Parsimony Haplotyping
R Fleischer, J Guo, R Niedermeier, J Uhlmann, Y Wang, M Weller, X Wu
Annual Symposium on Combinatorial Pattern Matching, 214-226, 2010
92010
Experimental Study of FPT Algorithms for the Directed Feedback Vertex Set Problem
R Fleischer, X Wu, L Yuan
European Symposium on Algorithms, 611-622, 2009
72009
When lempel-ziv-welch meets machine learning: A case study of accelerating machine learning using coding
F Li, L Chen, A Kumar, JF Naughton, JM Patel, X Wu
arXiv preprint arXiv:1702.06943, 2017
6*2017
Robust Attribution Regularization
J Chen, X Wu, V Rastogi, Y Liang, S Jha
Advances in Neural Information Processing Systems, 14300-14310, 2019
32019
DIFF: a relational interface for large-scale data explanation
F Abuzaid, P Kraft, S Suri, E Gan, E Xu, A Shenoy, A Ananthanarayan, ...
Proceedings of the VLDB Endowment 12 (4), 419-432, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20