Picture for Hanwei Zhang

Hanwei Zhang

Saarland University, Institute of Intelligent Software, Guangzhou

What Makes for a Good Saliency Map? Comparing Strategies for Evaluating Saliency Maps in Explainable AI (XAI)

Add code
Apr 23, 2025
Viaarxiv icon

AI Act for the Working Programmer

Add code
Jul 23, 2024
Viaarxiv icon

IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields

Add code
Jul 16, 2024
Figure 1 for IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields
Figure 2 for IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields
Figure 3 for IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields
Figure 4 for IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields
Viaarxiv icon

Enhancing robustness of data-driven SHM models: adversarial training with circle loss

Add code
Jun 20, 2024
Viaarxiv icon

Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds

Add code
May 23, 2024
Viaarxiv icon

A Survey on Visual Mamba

Add code
Apr 26, 2024
Viaarxiv icon

DP-Net: Learning Discriminative Parts for image recognition

Add code
Apr 23, 2024
Viaarxiv icon

A Learning Paradigm for Interpretable Gradients

Add code
Apr 23, 2024
Viaarxiv icon

CA-Stream: Attention-based pooling for interpretable image recognition

Add code
Apr 23, 2024
Figure 1 for CA-Stream: Attention-based pooling for interpretable image recognition
Figure 2 for CA-Stream: Attention-based pooling for interpretable image recognition
Figure 3 for CA-Stream: Attention-based pooling for interpretable image recognition
Figure 4 for CA-Stream: Attention-based pooling for interpretable image recognition
Viaarxiv icon

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights

Add code
Oct 18, 2023
Figure 1 for Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights
Figure 2 for Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights
Figure 3 for Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights
Figure 4 for Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights
Viaarxiv icon