Alert button
Picture for Kai Qiao

Kai Qiao

Alert button

Defense-guided Transferable Adversarial Attacks

Add code
Bookmark button
Alert button
Nov 04, 2020
Zifei Zhang, Kai Qiao, Jian Chen, Ningning Liang

Figure 1 for Defense-guided Transferable Adversarial Attacks
Figure 2 for Defense-guided Transferable Adversarial Attacks
Figure 3 for Defense-guided Transferable Adversarial Attacks
Figure 4 for Defense-guided Transferable Adversarial Attacks
Viaarxiv icon

Neural encoding and interpretation for high-level visual cortices based on fMRI using image caption features

Add code
Bookmark button
Alert button
Mar 26, 2020
Kai Qiao, Chi Zhang, Jian Chen, Linyuan Wang, Li Tong, Bin Yan

Figure 1 for Neural encoding and interpretation for high-level visual cortices based on fMRI using image caption features
Figure 2 for Neural encoding and interpretation for high-level visual cortices based on fMRI using image caption features
Figure 3 for Neural encoding and interpretation for high-level visual cortices based on fMRI using image caption features
Figure 4 for Neural encoding and interpretation for high-level visual cortices based on fMRI using image caption features
Viaarxiv icon

BigGAN-based Bayesian reconstruction of natural images from human brain activity

Add code
Bookmark button
Alert button
Mar 13, 2020
Kai Qiao, Jian Chen, Linyuan Wang, Chi Zhang, Li Tong, Bin Yan

Figure 1 for BigGAN-based Bayesian reconstruction of natural images from human brain activity
Figure 2 for BigGAN-based Bayesian reconstruction of natural images from human brain activity
Figure 3 for BigGAN-based Bayesian reconstruction of natural images from human brain activity
Figure 4 for BigGAN-based Bayesian reconstruction of natural images from human brain activity
Viaarxiv icon

AdvJND: Generating Adversarial Examples with Just Noticeable Difference

Add code
Bookmark button
Alert button
Feb 01, 2020
Zifei Zhang, Kai Qiao, Lingyun Jiang, Linyuan Wang, Bin Yan

Figure 1 for AdvJND: Generating Adversarial Examples with Just Noticeable Difference
Figure 2 for AdvJND: Generating Adversarial Examples with Just Noticeable Difference
Figure 3 for AdvJND: Generating Adversarial Examples with Just Noticeable Difference
Figure 4 for AdvJND: Generating Adversarial Examples with Just Noticeable Difference
Viaarxiv icon

HAD-GAN: A Human-perception Auxiliary Defense GAN to Defend Adversarial Examples

Add code
Bookmark button
Alert button
Sep 25, 2019
Wanting Yu, Hongyi Yu, Lingyun Jiang, Mengli Zhang, Kai Qiao, Linyuan Wang, Bin Yan

Figure 1 for HAD-GAN: A Human-perception Auxiliary Defense GAN to Defend Adversarial Examples
Figure 2 for HAD-GAN: A Human-perception Auxiliary Defense GAN to Defend Adversarial Examples
Figure 3 for HAD-GAN: A Human-perception Auxiliary Defense GAN to Defend Adversarial Examples
Figure 4 for HAD-GAN: A Human-perception Auxiliary Defense GAN to Defend Adversarial Examples
Viaarxiv icon

HAD-GAN: A Human-perception Auxiliary Defense GAN model to Defend Adversarial Examples

Add code
Bookmark button
Alert button
Sep 17, 2019
Wanting Yu, Hongyi Yu, Lingyun Jiang, Mengli Zhang, Kai Qiao, Linyuan Wang, Bin Yan

Figure 1 for HAD-GAN: A Human-perception Auxiliary Defense GAN model to Defend Adversarial Examples
Figure 2 for HAD-GAN: A Human-perception Auxiliary Defense GAN model to Defend Adversarial Examples
Figure 3 for HAD-GAN: A Human-perception Auxiliary Defense GAN model to Defend Adversarial Examples
Figure 4 for HAD-GAN: A Human-perception Auxiliary Defense GAN model to Defend Adversarial Examples
Viaarxiv icon

Effective and efficient ROI-wise visual encoding using an end-to-end CNN regression model and selective optimization

Add code
Bookmark button
Alert button
Jul 27, 2019
Kai Qiao, Chi Zhang, Jian Chen, Linyuan Wang, Li Tong, Bin Yan

Figure 1 for Effective and efficient ROI-wise visual encoding using an end-to-end CNN regression model and selective optimization
Figure 2 for Effective and efficient ROI-wise visual encoding using an end-to-end CNN regression model and selective optimization
Figure 3 for Effective and efficient ROI-wise visual encoding using an end-to-end CNN regression model and selective optimization
Figure 4 for Effective and efficient ROI-wise visual encoding using an end-to-end CNN regression model and selective optimization
Viaarxiv icon

Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense

Add code
Bookmark button
Alert button
Apr 12, 2019
Lingyun Jiang, Kai Qiao, Ruoxi Qin, Linyuan Wang, Jian Chen, Haibing Bu, Bin Yan

Figure 1 for Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense
Figure 2 for Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense
Figure 3 for Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense
Figure 4 for Cycle-Consistent Adversarial GAN: the integration of adversarial attack and defense
Viaarxiv icon

A visual encoding model based on deep neural networks and transfer learning

Add code
Bookmark button
Alert button
Feb 23, 2019
Chi Zhang, Kai Qiao, Linyuan Wang, Li Tong, Guoen Hu, Ruyuan Zhang, Bin Yan

Figure 1 for A visual encoding model based on deep neural networks and transfer learning
Figure 2 for A visual encoding model based on deep neural networks and transfer learning
Figure 3 for A visual encoding model based on deep neural networks and transfer learning
Figure 4 for A visual encoding model based on deep neural networks and transfer learning
Viaarxiv icon