Alert button
Picture for Shouhong Ding

Shouhong Ding

Alert button

Re-thinking Data Availablity Attacks Against Deep Neural Networks

Add code
Bookmark button
Alert button
May 18, 2023
Bin Fang, Bo Li, Shuang Wu, Ran Yi, Shouhong Ding, Lizhuang Ma

Figure 1 for Re-thinking Data Availablity Attacks Against Deep Neural Networks
Figure 2 for Re-thinking Data Availablity Attacks Against Deep Neural Networks
Figure 3 for Re-thinking Data Availablity Attacks Against Deep Neural Networks
Figure 4 for Re-thinking Data Availablity Attacks Against Deep Neural Networks
Viaarxiv icon

Content-based Unrestricted Adversarial Attack

Add code
Bookmark button
Alert button
May 18, 2023
Zhaoyu Chen, Bo Li, Shuang Wu, Kaixun Jiang, Shouhong Ding, Wenqiang Zhang

Figure 1 for Content-based Unrestricted Adversarial Attack
Figure 2 for Content-based Unrestricted Adversarial Attack
Figure 3 for Content-based Unrestricted Adversarial Attack
Figure 4 for Content-based Unrestricted Adversarial Attack
Viaarxiv icon

Instance-Aware Domain Generalization for Face Anti-Spoofing

Add code
Bookmark button
Alert button
Apr 12, 2023
Qianyu Zhou, Ke-Yue Zhang, Taiping Yao, Xuequan Lu, Ran Yi, Shouhong Ding, Lizhuang Ma

Figure 1 for Instance-Aware Domain Generalization for Face Anti-Spoofing
Figure 2 for Instance-Aware Domain Generalization for Face Anti-Spoofing
Figure 3 for Instance-Aware Domain Generalization for Face Anti-Spoofing
Figure 4 for Instance-Aware Domain Generalization for Face Anti-Spoofing
Viaarxiv icon

Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition

Add code
Bookmark button
Alert button
Mar 22, 2023
Zexin Li, Bangjie Yin, Taiping Yao, Juefeng Guo, Shouhong Ding, Simin Chen, Cong Liu

Figure 1 for Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition
Figure 2 for Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition
Figure 3 for Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition
Figure 4 for Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition
Viaarxiv icon

DistilPose: Tokenized Pose Regression with Heatmap Distillation

Add code
Bookmark button
Alert button
Mar 16, 2023
Suhang Ye, Yingyi Zhang, Jie Hu, Liujuan Cao, Shengchuan Zhang, Lei Shen, Jun Wang, Shouhong Ding, Rongrong Ji

Figure 1 for DistilPose: Tokenized Pose Regression with Heatmap Distillation
Figure 2 for DistilPose: Tokenized Pose Regression with Heatmap Distillation
Figure 3 for DistilPose: Tokenized Pose Regression with Heatmap Distillation
Figure 4 for DistilPose: Tokenized Pose Regression with Heatmap Distillation
Viaarxiv icon

Exploiting the Textual Potential from Vision-Language Pre-training for Text-based Person Search

Add code
Bookmark button
Alert button
Mar 08, 2023
Guanshuo Wang, Fufu Yu, Junjie Li, Qiong Jia, Shouhong Ding

Figure 1 for Exploiting the Textual Potential from Vision-Language Pre-training for Text-based Person Search
Figure 2 for Exploiting the Textual Potential from Vision-Language Pre-training for Text-based Person Search
Figure 3 for Exploiting the Textual Potential from Vision-Language Pre-training for Text-based Person Search
Figure 4 for Exploiting the Textual Potential from Vision-Language Pre-training for Text-based Person Search
Viaarxiv icon

Delving into the Adversarial Robustness of Federated Learning

Add code
Bookmark button
Alert button
Feb 19, 2023
Jie Zhang, Bo Li, Chen Chen, Lingjuan Lyu, Shuang Wu, Shouhong Ding, Chao Wu

Figure 1 for Delving into the Adversarial Robustness of Federated Learning
Figure 2 for Delving into the Adversarial Robustness of Federated Learning
Figure 3 for Delving into the Adversarial Robustness of Federated Learning
Figure 4 for Delving into the Adversarial Robustness of Federated Learning
Viaarxiv icon

Artificial Intelligence Security Competition (AISC)

Add code
Bookmark button
Alert button
Dec 07, 2022
Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, Yifei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang

Figure 1 for Artificial Intelligence Security Competition (AISC)
Figure 2 for Artificial Intelligence Security Competition (AISC)
Figure 3 for Artificial Intelligence Security Competition (AISC)
Figure 4 for Artificial Intelligence Security Competition (AISC)
Viaarxiv icon

Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition

Add code
Bookmark button
Alert button
Oct 13, 2022
Shuai Jia, Bangjie Yin, Taiping Yao, Shouhong Ding, Chunhua Shen, Xiaokang Yang, Chao Ma

Figure 1 for Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition
Figure 2 for Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition
Figure 3 for Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition
Figure 4 for Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition
Viaarxiv icon