Alert button
Picture for Shu-Tao Xia

Shu-Tao Xia

Alert button

Backdoor Attack in the Physical World

Apr 24, 2021
Yiming Li, Tongqing Zhai, Yong Jiang, Zhifeng Li, Shu-Tao Xia

Figure 1 for Backdoor Attack in the Physical World
Figure 2 for Backdoor Attack in the Physical World
Figure 3 for Backdoor Attack in the Physical World
Figure 4 for Backdoor Attack in the Physical World
Viaarxiv icon

TokenPose: Learning Keypoint Tokens for Human Pose Estimation

Apr 09, 2021
Yanjie Li, Shoukui Zhang, Zhicheng Wang, Sen Yang, Wankou Yang, Shu-Tao Xia, Erjin Zhou

Figure 1 for TokenPose: Learning Keypoint Tokens for Human Pose Estimation
Figure 2 for TokenPose: Learning Keypoint Tokens for Human Pose Estimation
Figure 3 for TokenPose: Learning Keypoint Tokens for Human Pose Estimation
Figure 4 for TokenPose: Learning Keypoint Tokens for Human Pose Estimation
Viaarxiv icon

Hidden Backdoor Attack against Semantic Segmentation Models

Apr 03, 2021
Yiming Li, Yanjie Li, Yalei Lv, Yong Jiang, Shu-Tao Xia

Figure 1 for Hidden Backdoor Attack against Semantic Segmentation Models
Figure 2 for Hidden Backdoor Attack against Semantic Segmentation Models
Figure 3 for Hidden Backdoor Attack against Semantic Segmentation Models
Viaarxiv icon

Improving Adversarial Robustness via Channel-wise Activation Suppressing

Mar 11, 2021
Yang Bai, Yuyuan Zeng, Yong Jiang, Shu-Tao Xia, Xingjun Ma, Yisen Wang

Figure 1 for Improving Adversarial Robustness via Channel-wise Activation Suppressing
Figure 2 for Improving Adversarial Robustness via Channel-wise Activation Suppressing
Figure 3 for Improving Adversarial Robustness via Channel-wise Activation Suppressing
Figure 4 for Improving Adversarial Robustness via Channel-wise Activation Suppressing
Viaarxiv icon

Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits

Feb 21, 2021
Jiawang Bai, Baoyuan Wu, Yong Zhang, Yiming Li, Zhifeng Li, Shu-Tao Xia

Figure 1 for Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
Figure 2 for Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
Figure 3 for Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
Figure 4 for Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
Viaarxiv icon

Backdoor Attack against Speaker Verification

Oct 25, 2020
Tongqing Zhai, Yiming Li, Ziqi Zhang, Baoyuan Wu, Yong Jiang, Shu-Tao Xia

Figure 1 for Backdoor Attack against Speaker Verification
Figure 2 for Backdoor Attack against Speaker Verification
Figure 3 for Backdoor Attack against Speaker Verification
Viaarxiv icon