Alert button
Picture for Dongxian Wu

Dongxian Wu

Alert button

Towards Robust Model Watermark via Reducing Parametric Vulnerability

Add code
Bookmark button
Alert button
Sep 09, 2023
Guanhao Gan, Yiming Li, Dongxian Wu, Shu-Tao Xia

Figure 1 for Towards Robust Model Watermark via Reducing Parametric Vulnerability
Figure 2 for Towards Robust Model Watermark via Reducing Parametric Vulnerability
Figure 3 for Towards Robust Model Watermark via Reducing Parametric Vulnerability
Figure 4 for Towards Robust Model Watermark via Reducing Parametric Vulnerability
Viaarxiv icon

An Efficient Virtual Data Generation Method for Reducing Communication in Federated Learning

Add code
Bookmark button
Alert button
Jun 29, 2023
Cheng Yang, Xue Yang, Dongxian Wu, Xiaohu Tang

Figure 1 for An Efficient Virtual Data Generation Method for Reducing Communication in Federated Learning
Figure 2 for An Efficient Virtual Data Generation Method for Reducing Communication in Federated Learning
Figure 3 for An Efficient Virtual Data Generation Method for Reducing Communication in Federated Learning
Figure 4 for An Efficient Virtual Data Generation Method for Reducing Communication in Federated Learning
Viaarxiv icon

When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture

Add code
Bookmark button
Alert button
Oct 14, 2022
Yichuan Mo, Dongxian Wu, Yifei Wang, Yiwen Guo, Yisen Wang

Figure 1 for When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture
Figure 2 for When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture
Figure 3 for When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture
Figure 4 for When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture
Viaarxiv icon

On the Effectiveness of Adversarial Training against Backdoor Attacks

Add code
Bookmark button
Alert button
Feb 22, 2022
Yinghua Gao, Dongxian Wu, Jingfeng Zhang, Guanhao Gan, Shu-Tao Xia, Gang Niu, Masashi Sugiyama

Figure 1 for On the Effectiveness of Adversarial Training against Backdoor Attacks
Figure 2 for On the Effectiveness of Adversarial Training against Backdoor Attacks
Figure 3 for On the Effectiveness of Adversarial Training against Backdoor Attacks
Figure 4 for On the Effectiveness of Adversarial Training against Backdoor Attacks
Viaarxiv icon

Adversarial Neuron Pruning Purifies Backdoored Deep Models

Add code
Bookmark button
Alert button
Oct 27, 2021
Dongxian Wu, Yisen Wang

Figure 1 for Adversarial Neuron Pruning Purifies Backdoored Deep Models
Figure 2 for Adversarial Neuron Pruning Purifies Backdoored Deep Models
Figure 3 for Adversarial Neuron Pruning Purifies Backdoored Deep Models
Figure 4 for Adversarial Neuron Pruning Purifies Backdoored Deep Models
Viaarxiv icon

Clean-label Backdoor Attack against Deep Hashing based Retrieval

Add code
Bookmark button
Alert button
Sep 18, 2021
Kuofeng Gao, Jiawang Bai, Bin Chen, Dongxian Wu, Shu-Tao Xia

Figure 1 for Clean-label Backdoor Attack against Deep Hashing based Retrieval
Figure 2 for Clean-label Backdoor Attack against Deep Hashing based Retrieval
Figure 3 for Clean-label Backdoor Attack against Deep Hashing based Retrieval
Figure 4 for Clean-label Backdoor Attack against Deep Hashing based Retrieval
Viaarxiv icon

Temporal Calibrated Regularization for Robust Noisy Label Learning

Add code
Bookmark button
Alert button
Jul 01, 2020
Dongxian Wu, Yisen Wang, Zhuobin Zheng, Shu-tao Xia

Figure 1 for Temporal Calibrated Regularization for Robust Noisy Label Learning
Figure 2 for Temporal Calibrated Regularization for Robust Noisy Label Learning
Figure 3 for Temporal Calibrated Regularization for Robust Noisy Label Learning
Figure 4 for Temporal Calibrated Regularization for Robust Noisy Label Learning
Viaarxiv icon

Targeted Attack for Deep Hashing based Retrieval

Add code
Bookmark button
Alert button
May 08, 2020
Jiawang Bai, Bin Chen, Yiming Li, Dongxian Wu, Weiwei Guo, Shu-tao Xia, En-hui Yang

Figure 1 for Targeted Attack for Deep Hashing based Retrieval
Figure 2 for Targeted Attack for Deep Hashing based Retrieval
Figure 3 for Targeted Attack for Deep Hashing based Retrieval
Figure 4 for Targeted Attack for Deep Hashing based Retrieval
Viaarxiv icon