Alert button
Picture for Shu-Tao Xia

Shu-Tao Xia

Alert button

BackdoorBox: A Python Toolbox for Backdoor Learning

Add code
Bookmark button
Alert button
Feb 01, 2023
Yiming Li, Mengxi Ya, Yang Bai, Yong Jiang, Shu-Tao Xia

Figure 1 for BackdoorBox: A Python Toolbox for Backdoor Learning
Figure 2 for BackdoorBox: A Python Toolbox for Backdoor Learning
Figure 3 for BackdoorBox: A Python Toolbox for Backdoor Learning
Viaarxiv icon

DELTA: degradation-free fully test-time adaptation

Add code
Bookmark button
Alert button
Jan 30, 2023
Bowen Zhao, Chen Chen, Shu-Tao Xia

Figure 1 for DELTA: degradation-free fully test-time adaptation
Figure 2 for DELTA: degradation-free fully test-time adaptation
Figure 3 for DELTA: degradation-free fully test-time adaptation
Figure 4 for DELTA: degradation-free fully test-time adaptation
Viaarxiv icon

Untargeted Backdoor Attack against Object Detection

Add code
Bookmark button
Alert button
Nov 02, 2022
Chengxiao Luo, Yiming Li, Yong Jiang, Shu-Tao Xia

Figure 1 for Untargeted Backdoor Attack against Object Detection
Figure 2 for Untargeted Backdoor Attack against Object Detection
Figure 3 for Untargeted Backdoor Attack against Object Detection
Figure 4 for Untargeted Backdoor Attack against Object Detection
Viaarxiv icon

BATT: Backdoor Attack with Transformation-based Triggers

Add code
Bookmark button
Alert button
Nov 02, 2022
Tong Xu, Yiming Li, Yong Jiang, Shu-Tao Xia

Figure 1 for BATT: Backdoor Attack with Transformation-based Triggers
Figure 2 for BATT: Backdoor Attack with Transformation-based Triggers
Figure 3 for BATT: Backdoor Attack with Transformation-based Triggers
Figure 4 for BATT: Backdoor Attack with Transformation-based Triggers
Viaarxiv icon

Backdoor Defense via Suppressing Model Shortcuts

Add code
Bookmark button
Alert button
Nov 02, 2022
Sheng Yang, Yiming Li, Yong Jiang, Shu-Tao Xia

Figure 1 for Backdoor Defense via Suppressing Model Shortcuts
Figure 2 for Backdoor Defense via Suppressing Model Shortcuts
Figure 3 for Backdoor Defense via Suppressing Model Shortcuts
Figure 4 for Backdoor Defense via Suppressing Model Shortcuts
Viaarxiv icon

Towards Mitigating the Problem of Insufficient and Ambiguous Supervision in Online Crowdsourcing Annotation

Add code
Bookmark button
Alert button
Oct 20, 2022
Qian-Wei Wang, Bowen Zhao, Mingyan Zhu, Tianxiang Li, Zimo Liu, Shu-Tao Xia

Figure 1 for Towards Mitigating the Problem of Insufficient and Ambiguous Supervision in Online Crowdsourcing Annotation
Figure 2 for Towards Mitigating the Problem of Insufficient and Ambiguous Supervision in Online Crowdsourcing Annotation
Figure 3 for Towards Mitigating the Problem of Insufficient and Ambiguous Supervision in Online Crowdsourcing Annotation
Figure 4 for Towards Mitigating the Problem of Insufficient and Ambiguous Supervision in Online Crowdsourcing Annotation
Viaarxiv icon

Towards Effective Image Manipulation Detection with Proposal Contrastive Learning

Add code
Bookmark button
Alert button
Oct 16, 2022
Yuyuan Zeng, Bowen Zhao, Shanzhao Qiu, Tao Dai, Shu-Tao Xia

Figure 1 for Towards Effective Image Manipulation Detection with Proposal Contrastive Learning
Figure 2 for Towards Effective Image Manipulation Detection with Proposal Contrastive Learning
Figure 3 for Towards Effective Image Manipulation Detection with Proposal Contrastive Learning
Figure 4 for Towards Effective Image Manipulation Detection with Proposal Contrastive Learning
Viaarxiv icon

Vertical Semi-Federated Learning for Efficient Online Advertising

Add code
Bookmark button
Alert button
Sep 30, 2022
Wenjie Li, Qiaolin Xia, Hao Cheng, Kouyin Xue, Shu-Tao Xia

Figure 1 for Vertical Semi-Federated Learning for Efficient Online Advertising
Figure 2 for Vertical Semi-Federated Learning for Efficient Online Advertising
Figure 3 for Vertical Semi-Federated Learning for Efficient Online Advertising
Figure 4 for Vertical Semi-Federated Learning for Efficient Online Advertising
Viaarxiv icon

Learning Transferable Spatiotemporal Representations from Natural Script Knowledge

Add code
Bookmark button
Alert button
Sep 30, 2022
Ziyun Zeng, Yuying Ge, Xihui Liu, Bin Chen, Ping Luo, Shu-Tao Xia, Yixiao Ge

Figure 1 for Learning Transferable Spatiotemporal Representations from Natural Script Knowledge
Figure 2 for Learning Transferable Spatiotemporal Representations from Natural Script Knowledge
Figure 3 for Learning Transferable Spatiotemporal Representations from Natural Script Knowledge
Figure 4 for Learning Transferable Spatiotemporal Representations from Natural Script Knowledge
Viaarxiv icon

Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection

Add code
Bookmark button
Alert button
Sep 27, 2022
Yiming Li, Yang Bai, Yong Jiang, Yong Yang, Shu-Tao Xia, Bo Li

Figure 1 for Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Figure 2 for Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Figure 3 for Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Figure 4 for Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Viaarxiv icon