Alert button
Picture for Diqun Yan

Diqun Yan

Alert button

Multi-Level Label Correction by Distilling Proximate Patterns for Semi-supervised Semantic Segmentation

Add code
Bookmark button
Alert button
Apr 10, 2024
Hui Xiao, Yuting Hong, Li Dong, Diqun Yan, Jiayan Zhuang, Junjie Xiong, Dongtai Liang, Chengbin Peng

Viaarxiv icon

Facial Data Minimization: Shallow Model as Your Privacy Filter

Add code
Bookmark button
Alert button
Oct 24, 2023
Yuwen Pu, Jiahao Chen, Jiayu Pan, Hao li, Diqun Yan, Xuhong Zhang, Shouling Ji

Viaarxiv icon

BadSQA: Stealthy Backdoor Attacks Using Presence Events as Triggers in Non-Intrusive Speech Quality Assessment

Add code
Bookmark button
Alert button
Sep 04, 2023
Ying Ren, Kailai Shen, Zhe Ye, Diqun Yan

Viaarxiv icon

Evil Operation: Breaking Speaker Recognition with PaddingBack

Add code
Bookmark button
Alert button
Aug 08, 2023
Zhe Ye, Diqun Yan, Li Dong, Kailai Shen

Figure 1 for Evil Operation: Breaking Speaker Recognition with PaddingBack
Figure 2 for Evil Operation: Breaking Speaker Recognition with PaddingBack
Figure 3 for Evil Operation: Breaking Speaker Recognition with PaddingBack
Figure 4 for Evil Operation: Breaking Speaker Recognition with PaddingBack
Viaarxiv icon

Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition

Add code
Bookmark button
Alert button
Aug 04, 2023
JiaCheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian

Figure 1 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 2 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 3 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 4 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Viaarxiv icon

Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion

Add code
Bookmark button
Alert button
Jun 28, 2023
Zhe Ye, Terui Mao, Li Dong, Diqun Yan

Figure 1 for Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion
Figure 2 for Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion
Figure 3 for Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion
Figure 4 for Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion
Viaarxiv icon

Semi-Supervised Semantic Segmentation with Cross Teacher Training

Add code
Bookmark button
Alert button
Sep 03, 2022
Hui Xiao, Li Dong, Kangkang Song, Hao Xu, Shuibo Fu, Diqun Yan, Chengbin Peng

Figure 1 for Semi-Supervised Semantic Segmentation with Cross Teacher Training
Figure 2 for Semi-Supervised Semantic Segmentation with Cross Teacher Training
Figure 3 for Semi-Supervised Semantic Segmentation with Cross Teacher Training
Figure 4 for Semi-Supervised Semantic Segmentation with Cross Teacher Training
Viaarxiv icon

Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations

Add code
Bookmark button
Alert button
Jun 30, 2022
Mingyu Dong, Jiahao Chen, Diqun Yan, Jingxing Gao, Li Dong, Rangding Wang

Figure 1 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 2 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 3 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 4 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Viaarxiv icon

Adversarial Privacy Protection on Speech Enhancement

Add code
Bookmark button
Alert button
Jun 16, 2022
Mingyu Dong, Diqun Yan, Rangding Wang

Figure 1 for Adversarial Privacy Protection on Speech Enhancement
Figure 2 for Adversarial Privacy Protection on Speech Enhancement
Figure 3 for Adversarial Privacy Protection on Speech Enhancement
Figure 4 for Adversarial Privacy Protection on Speech Enhancement
Viaarxiv icon

Transferability of Adversarial Attacks on Synthetic Speech Detection

Add code
Bookmark button
Alert button
May 16, 2022
Jiacheng Deng, Shunyi Chen, Li Dong, Diqun Yan, Rangding Wang

Figure 1 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 2 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 3 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 4 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Viaarxiv icon