Alert button
Picture for Can He

Can He

Alert button

FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations

Add code
Bookmark button
Alert button
Mar 12, 2023
Can He, Lingxiao Meng, Jiankun Wang, Max Q. -H. Meng

Figure 1 for FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations
Figure 2 for FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations
Figure 3 for FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations
Figure 4 for FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations
Viaarxiv icon

Robust Backdoor Attacks against Deep Neural Networks in Real Physical World

Add code
Bookmark button
Alert button
Apr 15, 2021
Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu

Figure 1 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 2 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 3 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 4 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Viaarxiv icon

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples

Add code
Bookmark button
Alert button
Mar 02, 2021
Mingfu Xue, Shichang Sun, Can He, Yushu Zhang, Jian Wang, Weiqiang Liu

Figure 1 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 2 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 3 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 4 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Viaarxiv icon

3D Invisible Cloak

Add code
Bookmark button
Alert button
Nov 27, 2020
Mingfu Xue, Can He, Zhiyu Wu, Jian Wang, Zhe Liu, Weiqiang Liu

Figure 1 for 3D Invisible Cloak
Figure 2 for 3D Invisible Cloak
Figure 3 for 3D Invisible Cloak
Figure 4 for 3D Invisible Cloak
Viaarxiv icon

Robust and Natural Physical Adversarial Examples for Object Detectors

Add code
Bookmark button
Alert button
Nov 27, 2020
Mingfu Xue, Chengxiang Yuan, Can He, Jian Wang, Weiqiang Liu

Viaarxiv icon

SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images

Add code
Bookmark button
Alert button
Nov 27, 2020
Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu

Figure 1 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 2 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 3 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 4 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Viaarxiv icon