<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://drhuangxiao.com/Statistics/Probability+basics</loc></url><url><loc>https://drhuangxiao.com/Statistics/Statistical+learning+theory</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/k-nearest+neighbour</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/The+library+of+ML+theory</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Preface</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Introduction</loc></url><url><loc>https://drhuangxiao.com/Blogs/How+to+connect+to+internet+scientifically</loc></url><url><loc>https://drhuangxiao.com/Blogs/What+is+Generative+AI+to+most+of+us%3F</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/data-flow-of-learn-process.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Home</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Arm+Race+Problem</loc></url><url><loc>https://drhuangxiao.com/Blogs/Face+recognition+with+dlib</loc></url><url><loc>https://drhuangxiao.com/Blogs/A+Matlab+Toolbox+for+Grammatical+Inference+(archived)</loc></url><url><loc>https://drhuangxiao.com/Blogs/Botnet+detection+paper+review</loc></url><url><loc>https://drhuangxiao.com/Blogs/ICML'15+conference+review</loc></url><url><loc>https://drhuangxiao.com/Blogs/Introduction+to+Support+Vector+Clustering</loc></url><url><loc>https://drhuangxiao.com/Statistics/Selected+probability+distributions</loc></url><url><loc>https://drhuangxiao.com/About</loc></url><url><loc>https://drhuangxiao.com/Blogs/My+blogs</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/adv-transferability-demo.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/AdvMLDefeniveCycle.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/AdvML+poison+vs+evasion.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Overview</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Overview</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Adversarial+re-training</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Explainable+adversarial+examples</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Threat+IoC</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Block+and+Quarantine</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Dimension+reduction</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Stochastic+activation+pruning</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Adversarial+detection+network</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Distributional+detection</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Bayesian+uncertainty+estimates</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Randomised+dropout</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Data+argumentation</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Ensemble+adversarial+training</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Non-differentiable+input+transformation</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Defensive+distillation</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Gradient+regularisation</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/PixelDefend</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Adversarial+training</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/L-BFGS+attack</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Fast+Gradient+Sign+Method+(FGSM)</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Carlini%26Wagner+(C%26W)+attack</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/DeepFool</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Projected+Gradient+Descent+(PGD)</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/AdvGAN</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Universal+Adversarial+Networks</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Poisoning+attack</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Label-flip+attack</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/TextAttack</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/TextFooler</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/BERT-Attack</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Gradient-based+Distributional+Attack+(GBDA)</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/HotFlip</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Universal+Adversarial+Triggers</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/AutoPrompt</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Jailbreak+prompting</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Human-in-the-loop+adversarial+generation</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Bot-Adversarial+Dialogue+(BAD+dataset)</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Feedback+Loop+In-context+Red+Teaming+(FLIRT)</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Attacks/Jacobian-based+Saliency+Maps+(JSM+and+its+variants)</loc></url><url><loc>https://drhuangxiao.com/Adversarial+machine+learning/Defences/Adversarial+logit+pairing</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Linear+model</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Transformer</loc></url><url><loc>https://drhuangxiao.com/Blogs/Cracking+the+Annotated+Transformer+-+Part+I</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Perplexity</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Label+smoothing</loc></url><url><loc>https://drhuangxiao.com/Blogs/Cracking+the+Annotated+Transformer+-+Part+II</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Matthew+Correlation+Coefficient</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Focal+Loss</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Handling+missing+values</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/transformer_target_example.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/transformer_pos_encoding.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/transformer_multihead_attention_details.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/transformer_input_output.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/transformer_encoder_details.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/transformer_decoder_details.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/transformer-highlevel_1.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/adv_attack_taxonomy_diagram.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/SWD_V_model.excalidraw</loc></url><url><loc>https://drhuangxiao.com/Excalidraw/AdvML+knowledge+scale+and+robustness+bounds.excalidraw</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Feature+scaling</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Metrics+for+clustering+algorithms</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/BLEU+score</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Class-balanced+loss</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Sampling+techniques+in+machine+learning</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Importance+sampling</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Evaluation+metrics+for+classification</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Common+loss+functions</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Inductive+bias</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Vision+Transformer</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/A+brief+introduction+on+ResNet</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Similarity+search+metrics</loc></url><url><loc>https://drhuangxiao.com/The+library+of+machine+learning+theory/Vector+indexing+and+approximate+search</loc></url><url><loc>https://drhuangxiao.com/Engineering/Recommendation+systems</loc></url></urlset>