Shadowdiffusion: When degradation prior meets diffusion model for shadow removal
Recent deep learning methods have achieved promising results in image shadow removal.
However, their restored images still suffer from unsatisfactory boundary artifacts, due to the …
However, their restored images still suffer from unsatisfactory boundary artifacts, due to the …
Frequency guidance matters in few-shot learning
Few-shot classification aims to learn a discriminative feature representation to recognize
unseen classes with few labeled support samples. While most few-shot learning methods …
unseen classes with few labeled support samples. While most few-shot learning methods …
Nearest is not dearest: Towards practical defense against quantization-conditioned backdoor attacks
Abstract Model quantization is widely used to compress and accelerate deep neural
networks. However recent studies have revealed the feasibility of weaponizing model …
networks. However recent studies have revealed the feasibility of weaponizing model …
A Comprehensive Survey on Backdoor Attacks and their Defenses in Face Recognition Systems
Deep learning has significantly transformed face recognition, enabling the deployment of
large-scale, state-of-the-art solutions worldwide. However, the widespread adoption of deep …
large-scale, state-of-the-art solutions worldwide. However, the widespread adoption of deep …
Raw image reconstruction with learned compact metadata
While raw images exhibit advantages over sRGB images (eg linearity and fine-grained
quantization level), they are not widely used by common users due to the large storage …
quantization level), they are not widely used by common users due to the large storage …
Semantic deep hiding for robust unlearnable examples
Ensuring data privacy and protection has become paramount in the era of deep learning.
Unlearnable examples are proposed to mislead the deep learning models and prevent data …
Unlearnable examples are proposed to mislead the deep learning models and prevent data …
Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing
Abstract Face Anti-Spoofing (FAS) is crucial for securing face recognition systems against
presentation attacks. With advancements in sensor manufacture and multi-modal learning …
presentation attacks. With advancements in sensor manufacture and multi-modal learning …
Event trojan: Asynchronous event-based backdoor attacks
As asynchronous event data is more frequently engaged in various vision tasks, the risk of
backdoor attacks becomes more evident. However, research into the potential risk …
backdoor attacks becomes more evident. However, research into the potential risk …
Towards Physical World Backdoor Attacks against Skeleton Action Recognition
Abstract Skeleton Action Recognition (SAR) has attracted significant interest for its efficient
representation of the human skeletal structure. Despite its advancements, recent studies …
representation of the human skeletal structure. Despite its advancements, recent studies …
Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving
In autonomous driving behavior prediction is fundamental for safe motion planning hence
the security and robustness of prediction models against adversarial attacks are of …
the security and robustness of prediction models against adversarial attacks are of …