Follow
Yi Yu
Title
Cited by
Cited by
Year
Towards robust rain removal against adversarial attacks: A comprehensive benchmark analysis and beyond
Y Yu, W Yang, YP Tan, AC Kot
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
642022
Exposurediffusion: Learning to expose for low-light image enhancement
Y Wang, Y Yu, W Yang, L Guo, LP Chau, AC Kot, B Wen
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
522023
Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger
Y Yu, Y Wang, W Yang, S Lu, Y Tan, AC Kot
The IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023, 2023
492023
Raw Image Reconstruction with Learned Compact Metadata
Y Wang, Y Yu, W Yang, L Guo, LP Chau, A Kot, B Wen
The IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023, 2023
152023
Classification of pancreatic cystic neoplasms based on multimodality images
W Chen, H Ji, J Feng, R Liu, Y Yu, R Zhou, J Zhou
International Workshop on Machine Learning in Medical Imaging, 161-169, 2018
132018
Moe-ffd: Mixture of experts for generalized and parameter-efficient face forgery detection
C Kong, A Luo, P Bao, Y Yu, H Li, Z Zheng, S Wang, AC Kot
arXiv preprint arXiv:2404.08452, 2024
112024
Safeguarding medical image segmentation datasets against unauthorized training via contour-and texture-aware perturbations
X Lin, Y Yu, S Xia, J Jiang, H Wang, Z Yu, Y Liu, Y Fu, S Wang, W Tang, ...
arXiv preprint arXiv:2403.14250, 2024
82024
Mitigating the Curse of Dimensionality for Certified Robustness via Dual Randomized Smoothing
S Xia, Y Yu, X Jiang, H Ding
ICLR 2024, 2023
82023
Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders
Y Yu, Y Wang, S Xia, W Yang, S Lu, YP Tan, AC Kot
ICML 2024, 2024
72024
Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks
C Wang, Y Yu, L Guo, B Wen
ICASSP 2024, 2024
72024
Progressive Divide-and-Conquer via Subsampling Decomposition for Accelerated MRI
C Wang, L Guo, Y Wang, H Cheng, Y Yu, B Wen
CVPR 2024, 2024
62024
Semantic Deep Hiding for Robust Unlearnable Examples
R Meng, C Yi, Y Yu, S Yang, B Shen, AC Kot
IEEE TIFS 2024, 2024
42024
Beyond learned metadata-based raw image reconstruction
Y Wang, Y Yu, W Yang, L Guo, LP Chau, AC Kot, B Wen
IJCV 2024, 2023
42023
Towards Physical World Backdoor Attacks against Skeleton Action Recognition
Q Zheng, Y Yu, S Yang, J Liu, KY Lam, A Kot
ECCV 2024, 2024
22024
Single-Image Shadow Removal Using Deep Learning: A Comprehensive Survey
L Guo, C Wang, Y Wang, Y Yu, S Huang, W Yang, AC Kot, B Wen
arXiv preprint arXiv:2407.08865, 2024
22024
Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Y Yu, Y Wang, W Yang, L Guo, S Lu, LY Duan, YP Tan, AC Kot
IEEE Transactions on Pattern Analysis and Machine Intelligence 2024, 2024
12024
Transferable Adversarial Attacks on SAM and Its Downstream Models
S Xia, W Yang, Y Yu, X Lin, H Ding, L Duan, X Jiang
NeurIPS 2024, 2024
12024
HideMIA: Hidden Wavelet Mining for Privacy-Enhancing Medical Image Analysis
X Lin*, Y Yu*, YU Zitong, R Meng, J Zhou, A Liu, Y Liu, S Wang, W Tang, ...
ACM Multimedia 2024, 2024
12024
Backdoor Attacks against No-Reference Image Quality Assessment Models via a Scalable Trigger
Y Yu, S Xia, X Lin, W Yang, S Lu, Y Tan, A Kot
AAAI Conference on Artificial Intelligence (AAAI) 2025, 2024
2024
Unlearnable Examples Detection via Iterative Filtering
Y Yu, Q Zheng, S Yang, W Yang, J Liu, S Lu, YP Tan, KY Lam, A Kot
ICANN 2024, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20