Alert button
Picture for Shouling Ji

Shouling Ji

Alert button

Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning

Add code
Bookmark button
Alert button
May 21, 2022
Yangkai Du, Tengfei Ma, Lingfei Wu, Yiming Wu, Xuhong Zhang, Bo Long, Shouling Ji

Figure 1 for Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning
Figure 2 for Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning
Figure 3 for Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning
Figure 4 for Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning
Viaarxiv icon

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings

Add code
Bookmark button
Alert button
Apr 07, 2022
Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang

Figure 1 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 2 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 3 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 4 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Viaarxiv icon

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It

Add code
Bookmark button
Alert button
Mar 13, 2022
Dayong Ye, Huiqiang Chen, Shuai Zhou, Tianqing Zhu, Wanlei Zhou, Shouling Ji

Figure 1 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 2 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 3 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 4 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Viaarxiv icon

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

Add code
Bookmark button
Alert button
Feb 22, 2022
Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang

Figure 1 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 2 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 3 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 4 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Viaarxiv icon

GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction

Add code
Bookmark button
Alert button
Feb 21, 2022
Sihao Hu, Yi Cao, Yu Gong, Zhao Li, Yazheng Yang, Qingwen Liu, Wengwu Ou, Shouling Ji

Figure 1 for GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction
Figure 2 for GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction
Figure 3 for GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction
Figure 4 for GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction
Viaarxiv icon

Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction

Add code
Bookmark button
Alert button
Dec 30, 2021
Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, Li Cheng

Figure 1 for Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction
Figure 2 for Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction
Figure 3 for Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction
Figure 4 for Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction
Viaarxiv icon

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification

Add code
Bookmark button
Alert button
Dec 25, 2021
Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen

Figure 1 for NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification
Figure 2 for NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification
Figure 3 for NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification
Figure 4 for NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification
Viaarxiv icon

NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks

Add code
Bookmark button
Alert button
Dec 24, 2021
Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng, Yue Yu, Shouling Ji

Figure 1 for NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks
Figure 2 for NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks
Figure 3 for NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks
Figure 4 for NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks
Viaarxiv icon

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art

Add code
Bookmark button
Alert button
Dec 23, 2021
Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu

Figure 1 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 2 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 3 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Figure 4 for Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Viaarxiv icon

Backdoor Pre-trained Models Can Transfer to All

Add code
Bookmark button
Alert button
Oct 30, 2021
Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang

Figure 1 for Backdoor Pre-trained Models Can Transfer to All
Figure 2 for Backdoor Pre-trained Models Can Transfer to All
Figure 3 for Backdoor Pre-trained Models Can Transfer to All
Figure 4 for Backdoor Pre-trained Models Can Transfer to All
Viaarxiv icon