Alert button
Picture for Weixuan Tang

Weixuan Tang

Alert button

Black-box Adversarial Attacks Against Image Quality Assessment Models

Add code
Bookmark button
Alert button
Feb 28, 2024
Yu Ran, Ao-Xiang Zhang, Mingjie Li, Weixuan Tang, Yuan-Gen Wang

Viaarxiv icon

Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks

Add code
Bookmark button
Alert button
Sep 24, 2023
Ao-Xiang Zhang, Yu Ran, Weixuan Tang, Yuan-Gen Wang

Viaarxiv icon

StarVQA+: Co-training Space-Time Attention for Video Quality Assessment

Add code
Bookmark button
Alert button
Jun 21, 2023
Fengchuang Xing, Yuan-Gen Wang, Weixuan Tang, Guopu Zhu, Sam Kwong

Viaarxiv icon

HVS Revisited: A Comprehensive Video Quality Assessment Framework

Add code
Bookmark button
Alert button
Oct 09, 2022
Ao-Xiang Zhang, Yuan-Gen Wang, Weixuan Tang, Leida Li, Sam Kwong

Figure 1 for HVS Revisited: A Comprehensive Video Quality Assessment Framework
Figure 2 for HVS Revisited: A Comprehensive Video Quality Assessment Framework
Figure 3 for HVS Revisited: A Comprehensive Video Quality Assessment Framework
Figure 4 for HVS Revisited: A Comprehensive Video Quality Assessment Framework
Viaarxiv icon

Multi-instance Point Cloud Registration by Efficient Correspondence Clustering

Add code
Bookmark button
Alert button
Nov 29, 2021
Weixuan Tang, Danping Zou

Figure 1 for Multi-instance Point Cloud Registration by Efficient Correspondence Clustering
Figure 2 for Multi-instance Point Cloud Registration by Efficient Correspondence Clustering
Figure 3 for Multi-instance Point Cloud Registration by Efficient Correspondence Clustering
Figure 4 for Multi-instance Point Cloud Registration by Efficient Correspondence Clustering
Viaarxiv icon

Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge

Add code
Bookmark button
Alert button
May 09, 2021
Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang

Figure 1 for Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge
Figure 2 for Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge
Figure 3 for Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge
Figure 4 for Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge
Viaarxiv icon

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image

Add code
Bookmark button
Alert button
Jan 13, 2021
Xinghong Qin, Shunquan Tan, Bin Li, Weixuan Tang, Jiwu Huang

Figure 1 for Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Figure 2 for Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Figure 3 for Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Figure 4 for Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Viaarxiv icon