Picture for Ruofei Wang

Ruofei Wang

Physics-informed deep operator network for traffic state estimation

Add code
Aug 18, 2025
Viaarxiv icon

Event Trojan: Asynchronous Event-based Backdoor Attacks

Add code
Jul 09, 2024
Figure 1 for Event Trojan: Asynchronous Event-based Backdoor Attacks
Figure 2 for Event Trojan: Asynchronous Event-based Backdoor Attacks
Figure 3 for Event Trojan: Asynchronous Event-based Backdoor Attacks
Figure 4 for Event Trojan: Asynchronous Event-based Backdoor Attacks
Viaarxiv icon

Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack

Add code
Jan 04, 2024
Figure 1 for Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Figure 2 for Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Figure 3 for Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Figure 4 for Spy-Watermark: Robust Invisible Watermarking for Backdoor Attack
Viaarxiv icon

Background-Mixed Augmentation for Weakly Supervised Change Detection

Add code
Dec 01, 2022
Viaarxiv icon

IDET: Iterative Difference-Enhanced Transformers for High-Quality Change Detection

Add code
Jul 15, 2022
Figure 1 for IDET: Iterative Difference-Enhanced Transformers for High-Quality Change Detection
Figure 2 for IDET: Iterative Difference-Enhanced Transformers for High-Quality Change Detection
Figure 3 for IDET: Iterative Difference-Enhanced Transformers for High-Quality Change Detection
Figure 4 for IDET: Iterative Difference-Enhanced Transformers for High-Quality Change Detection
Viaarxiv icon