Spremljaj
Xiao Yang
Xiao Yang
Preverjeni e-poštni naslov na mails.tsinghua.edu.cn - Domača stran
Naslov
Navedeno
Navedeno
Leto
Dab-detr: Dynamic anchor boxes are better queries for detr
S Liu, F Li, H Zhang, X Yang, X Qi, H Su, J Zhu, L Zhang
arXiv preprint arXiv:2201.12329, 2022
9172022
Bag of tricks for adversarial training
T Pang, X Yang, Y Dong, H Su, J Zhu
arXiv preprint arXiv:2010.00467, 2020
352*2020
Benchmarking adversarial robustness on image classification
Y Dong, QA Fu, X Yang, T Pang, H Su, Z Xiao, J Zhu
proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
3402020
Face anti-spoofing: Model matters, so does data
X Yang, W Luo, L Bao, Y Gao, D Gong, S Zheng, Z Li, W Liu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
2912019
Query2label: A simple transformer way to multi-label classification
S Liu, L Zhang, X Yang, H Su, J Zhu
arXiv preprint arXiv:2107.10834, 2021
2462021
On evaluating adversarial robustness of large vision-language models
Y Zhao, T Pang, C Du, X Yang, C Li, NMM Cheung, M Lin
Advances in Neural Information Processing Systems 36, 54111-54138, 2023
1982023
Boosting adversarial training with hypersphere embedding
T Pang*, X Yang*, Y Dong, K Xu, J Zhu, H Su
Advances in Neural Information Processing Systems 33, 7779-7792, 2020
1682020
Common diffusion noise schedules and sample steps are flawed
S Lin, B Liu, J Li, X Yang
Proceedings of the IEEE/CVF winter conference on applications of computer …, 2024
1642024
Robustness and accuracy could be reconcilable by (proper) definition
T Pang, M Lin, X Yang, J Zhu, S Yan
International conference on machine learning, 17258-17277, 2022
1502022
Black-box detection of backdoor attacks with limited information and data
Y Dong, X Yang, Z Deng, T Pang, Z Xiao, H Su, J Zhu
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021
1332021
A recipe for watermarking diffusion models
Y Zhao, T Pang, C Du, X Yang, NM Cheung, M Lin
arXiv preprint arXiv:2303.10137, 2023
1312023
How robust is google's bard to adversarial image attacks?
Y Dong, H Chen, J Chen, Z Fang, X Yang, Y Zhang, Y Tian, H Su, J Zhu
arXiv preprint arXiv:2309.11751, 2023
1072023
Towards face encryption by generating adversarial identity masks
X Yang, Y Dong, T Pang, H Su, J Zhu, Y Chen, H Xue
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021
1072021
Benchmarking robustness of 3d object detection to common corruptions
Y Dong, C Kang, J Zhang, Z Zhu, Y Wang, X Yang, H Su, X Wei, J Zhu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
992023
Exploring memorization in adversarial training
Y Dong, K Xu, X Yang, T Pang, Z Deng, H Su, J Zhu
arXiv preprint arXiv:2106.01606, 2021
902021
A comprehensive study on robustness of image classification models: Benchmarking and rethinking
C Liu, Y Dong, W Xiang, X Yang, H Su, J Zhu, Y Chen, Y He, H Xue, ...
International Journal of Computer Vision, 1-23, 2024
742024
Libre: A practical bayesian approach to adversarial detection
Z Deng, X Yang, S Xu, H Su, J Zhu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
742021
Economic, environmental, and emergy analysis of China's green tea production
Q Xu, Y Yang, K Hu, J Chen, SN Djomo, X Yang, MT Knudsen
Sustainable Production and Consumption 28, 269-280, 2021
662021
Robust classification via a single diffusion model
H Chen, Y Dong, Z Wang, X Yang, C Duan, H Su, J Zhu
arXiv preprint arXiv:2305.15241, 2023
592023
Evil geniuses: Delving into the safety of llm-based agents
Y Tian, X Yang, J Zhang, Y Dong, H Su
arXiv preprint arXiv:2311.11855, 2023
512023
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20