Get our free extension to see links to code for papers anywhere online!

Chrome logo Add to Chrome

Firefox logo Add to Firefox

Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning



Yangkai Du , Tengfei Ma , Lingfei Wu , Yiming Wu , Xuhong Zhang , Bo Long , Shouling Ji


   Access Paper or Ask Questions

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings



Yuhao Mao , Chong Fu , Saizhuo Wang , Shouling Ji , Xuhong Zhang , Zhenguang Liu , Jun Zhou , Alex X. Liu , Raheem Beyah , Ting Wang

* Accepted to IEEE Security & Privacy 2022 

   Access Paper or Ask Questions

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It



Dayong Ye , Huiqiang Chen , Shuai Zhou , Tianqing Zhu , Wanlei Zhou , Shouling Ji


   Access Paper or Ask Questions

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era



Changjiang Li , Li Wang , Shouling Ji , Xuhong Zhang , Zhaohan Xi , Shanqing Guo , Ting Wang

* Accepted as a full paper at USENIX Security '22 

   Access Paper or Ask Questions

GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction



Sihao Hu , Yi Cao , Yu Gong , Zhao Li , Yazheng Yang , Qingwen Liu , Wengwu Ou , Shouling Ji


   Access Paper or Ask Questions

Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction



Zhenguang Liu , Shuang Wu , Shuyuan Jin , Shouling Ji , Qi Liu , Shijian Lu , Li Cheng

* Accepted to IEEE TPAMI, 27 Dec. 2021 

   Access Paper or Ask Questions

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification



Haibin Zheng , Zhiqing Chen , Tianyu Du , Xuhong Zhang , Yao Cheng , Shouling Ji , Jingyi Wang , Yue Yu , Jinyin Chen


   Access Paper or Ask Questions

NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks



Ruoxi Chen , Haibo Jin , Jinyin Chen , Haibin Zheng , Yue Yu , Shouling Ji

* 14 pages 

   Access Paper or Ask Questions

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art



Xiang Ling , Lingfei Wu , Jiangyu Zhang , Zhenqing Qu , Wei Deng , Xiang Chen , Chunming Wu , Shouling Ji , Tianyue Luo , Jingzheng Wu , Yanjun Wu


   Access Paper or Ask Questions

Backdoor Pre-trained Models Can Transfer to All



Lujia Shen , Shouling Ji , Xuhong Zhang , Jinfeng Li , Jing Chen , Jie Shi , Chengfang Fang , Jianwei Yin , Ting Wang


   Access Paper or Ask Questions

1
2
3
4
5
>>