Alert button
Picture for Bangzheng Pu

Bangzheng Pu

Alert button

SAM-Lightening: A Lightweight Segment Anything Model with Dilated Flash Attention to Achieve 30 times Acceleration

Add code
Bookmark button
Alert button
Mar 18, 2024
Yanfei Song, Bangzheng Pu, Peng Wang, Hongxu Jiang, Dong Dong, Yongxiang Cao, Yiqing Shen

Figure 1 for SAM-Lightening: A Lightweight Segment Anything Model with Dilated Flash Attention to Achieve 30 times Acceleration
Figure 2 for SAM-Lightening: A Lightweight Segment Anything Model with Dilated Flash Attention to Achieve 30 times Acceleration
Figure 3 for SAM-Lightening: A Lightweight Segment Anything Model with Dilated Flash Attention to Achieve 30 times Acceleration
Figure 4 for SAM-Lightening: A Lightweight Segment Anything Model with Dilated Flash Attention to Achieve 30 times Acceleration
Viaarxiv icon

MedLocker: A Transferable Adversarial Watermarking for Preventing Unauthorized Analysis of Medical Image Dataset

Add code
Bookmark button
Alert button
Mar 20, 2023
Bangzheng Pu, Xingxing Wei, Shiji Zhao, Huazhu Fu

Figure 1 for MedLocker: A Transferable Adversarial Watermarking for Preventing Unauthorized Analysis of Medical Image Dataset
Figure 2 for MedLocker: A Transferable Adversarial Watermarking for Preventing Unauthorized Analysis of Medical Image Dataset
Figure 3 for MedLocker: A Transferable Adversarial Watermarking for Preventing Unauthorized Analysis of Medical Image Dataset
Figure 4 for MedLocker: A Transferable Adversarial Watermarking for Preventing Unauthorized Analysis of Medical Image Dataset
Viaarxiv icon

Physically Adversarial Attacks and Defenses in Computer Vision: A Survey

Add code
Bookmark button
Alert button
Nov 03, 2022
Xingxing Wei, Bangzheng Pu, Jiefan Lu, Baoyuan Wu

Figure 1 for Physically Adversarial Attacks and Defenses in Computer Vision: A Survey
Figure 2 for Physically Adversarial Attacks and Defenses in Computer Vision: A Survey
Figure 3 for Physically Adversarial Attacks and Defenses in Computer Vision: A Survey
Figure 4 for Physically Adversarial Attacks and Defenses in Computer Vision: A Survey
Viaarxiv icon