Shadowdiffusion: When degradation prior meets diffusion model for shadow removal

L Guo, C Wang, W Yang, S Huang… - Proceedings of the …, 2023 - openaccess.thecvf.com
Recent deep learning methods have achieved promising results in image shadow removal.
However, their restored images still suffer from unsatisfactory boundary artifacts, due to the …

Frequency guidance matters in few-shot learning

H Cheng, S Yang, JT Zhou, L Guo… - Proceedings of the …, 2023 - openaccess.thecvf.com
Few-shot classification aims to learn a discriminative feature representation to recognize
unseen classes with few labeled support samples. While most few-shot learning methods …

Nearest is not dearest: Towards practical defense against quantization-conditioned backdoor attacks

B Li, Y Cai, H Li, F Xue, Z Li… - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Abstract Model quantization is widely used to compress and accelerate deep neural
networks. However recent studies have revealed the feasibility of weaponizing model …

A Comprehensive Survey on Backdoor Attacks and their Defenses in Face Recognition Systems

Q Le Roux, E Bourbao, Y Teglia, K Kallas - IEEE Access, 2024 - ieeexplore.ieee.org
Deep learning has significantly transformed face recognition, enabling the deployment of
large-scale, state-of-the-art solutions worldwide. However, the widespread adoption of deep …

Raw image reconstruction with learned compact metadata

Y Wang, Y Yu, W Yang, L Guo… - Proceedings of the …, 2023 - openaccess.thecvf.com
While raw images exhibit advantages over sRGB images (eg linearity and fine-grained
quantization level), they are not widely used by common users due to the large storage …

Semantic deep hiding for robust unlearnable examples

R Meng, C Yi, Y Yu, S Yang, B Shen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Ensuring data privacy and protection has become paramount in the era of deep learning.
Unlearnable examples are proposed to mislead the deep learning models and prevent data …

Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing

X Lin, S Wang, R Cai, Y Liu, Y Fu… - Proceedings of the …, 2024 - openaccess.thecvf.com
Abstract Face Anti-Spoofing (FAS) is crucial for securing face recognition systems against
presentation attacks. With advancements in sensor manufacture and multi-modal learning …

Event trojan: Asynchronous event-based backdoor attacks

R Wang, Q Guo, H Li, R Wan - European Conference on Computer Vision, 2024 - Springer
As asynchronous event data is more frequently engaged in various vision tasks, the risk of
backdoor attacks becomes more evident. However, research into the potential risk …

Towards Physical World Backdoor Attacks against Skeleton Action Recognition

Q Zheng, Y Yu, S Yang, J Liu, KY Lam, A Kot - European Conference on …, 2024 - Springer
Abstract Skeleton Action Recognition (SAR) has attracted significant interest for its efficient
representation of the human skeletal structure. Despite its advancements, recent studies …

Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving

M Pourkeshavarz, M Sabokrou… - Proceedings of the …, 2024 - openaccess.thecvf.com
In autonomous driving behavior prediction is fundamental for safe motion planning hence
the security and robustness of prediction models against adversarial attacks are of …