Chuan Guo
Chuan Guo
Research Scientist, Facebook AI Research
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
On calibration of modern neural networks
C Guo, G Pleiss, Y Sun, KQ Weinberger
International Conference on Machine Learning, 1321-1330, 2017
20952017
Countering adversarial images using input transformations
C Guo, M Rana, M Cisse, L Van Der Maaten
arXiv preprint arXiv:1711.00117, 2017
8342017
Simple black-box adversarial attacks
C Guo, J Gardner, Y You, AG Wilson, K Weinberger
International Conference on Machine Learning, 2484-2493, 2019
1912019
An empirical study on evaluation metrics of generative adversarial networks
Q Xu, G Huang, Y Yuan, C Guo, Y Sun, F Wu, K Weinberger
arXiv preprint arXiv:1806.07755, 2018
1822018
Supervised word mover's distance
G Huang, C Quo, MJ Kusner, Y Sun, KQ Weinberger, F Sha
Proceedings of the 30th International Conference on Neural Information …, 2016
1462016
Low frequency adversarial perturbation
C Guo, JS Frank, KQ Weinberger
arXiv preprint arXiv:1809.08758, 2018
722018
Discovering and exploiting additive structure for Bayesian optimization
J Gardner, C Guo, K Weinberger, R Garnett, R Grosse
Artificial Intelligence and Statistics, 1311-1319, 2017
592017
Certified data removal from machine learning models
C Guo, T Goldstein, A Hannun, L Van Der Maaten
arXiv preprint arXiv:1911.03030, 2019
572019
A new defense against adversarial images: Turning a weakness into a strength
T Yu, S Hu, C Guo, WL Chao, KQ Weinberger
arXiv preprint arXiv:1910.07629, 2019
532019
Breaking the glass ceiling for embedding-based classifiers for large output spaces
C Guo, A Mousavi, X Wu, D Holtmann-Rice, S Kale, S Reddi, S Kumar
332019
Palindromic rich words and run-length encodings
C Guo, J Shallit, AM Shur
Information Processing Letters 116 (12), 735-738, 2016
22*2016
Trojannet: Embedding hidden trojan horse models in neural networks
C Guo, R Wu, KQ Weinberger
arXiv preprint arXiv:2002.10078, 2020
17*2020
Secure multiparty computations in floating-point arithmetic
C Guo, A Hannun, B Knott, L van der Maaten, M Tygert, R Zhu
arXiv preprint arXiv:2001.03192, 2020
122020
On tight bounds for binary frameproof codes
C Guo, DR Stinson, T Van Trung
Designs, Codes and Cryptography 77 (2), 301-319, 2015
112015
Byzantine-Robust and Privacy-Preserving Framework for FedML
H Hashemi, Y Wang, C Guo, M Annavaram
arXiv preprint arXiv:2105.02295, 2021
52021
React: Out-of-distribution detection with rectified activations
Y Sun, C Guo, Y Li
Advances in Neural Information Processing Systems 34, 2021
42021
Gradient-based Adversarial Attacks against Text Transformers
C Guo, A Sablayrolles, H Jégou, D Kiela
arXiv preprint arXiv:2104.13733, 2021
32021
Making Paper Reviewing Robust to Bid Manipulation Attacks
R Wu, C Guo, F Wu, R Kidambi, L van der Maaten, KQ Weinberger
arXiv preprint arXiv:2102.06020, 2021
32021
A tight bound on the size of certain separating hash families
C Guo, DR Stinson
arXiv preprint arXiv:1510.00293, 2015
32015
On symmetric designs and binary 3-frameproof codes
C Guo, DR Stinson, T van Trung
Algebraic Design Theory and Hadamard Matrices, 125-136, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20