Alert button
Picture for Xianglong Liu

Xianglong Liu

Alert button

BiBench: Benchmarking and Analyzing Network Binarization

Add code
Bookmark button
Alert button
Jan 26, 2023
Haotong Qin, Mingyuan Zhang, Yifu Ding, Aoyu Li, Zhongang Cai, Ziwei Liu, Fisher Yu, Xianglong Liu

Figure 1 for BiBench: Benchmarking and Analyzing Network Binarization
Figure 2 for BiBench: Benchmarking and Analyzing Network Binarization
Figure 3 for BiBench: Benchmarking and Analyzing Network Binarization
Figure 4 for BiBench: Benchmarking and Analyzing Network Binarization
Viaarxiv icon

Phonemic Adversarial Attack against Audio Recognition in Real World

Add code
Bookmark button
Alert button
Nov 19, 2022
Jiakai Wang, Zhendong Chen, Zixin Yin, Qinghong Yang, Xianglong Liu

Figure 1 for Phonemic Adversarial Attack against Audio Recognition in Real World
Figure 2 for Phonemic Adversarial Attack against Audio Recognition in Real World
Figure 3 for Phonemic Adversarial Attack against Audio Recognition in Real World
Figure 4 for Phonemic Adversarial Attack against Audio Recognition in Real World
Viaarxiv icon

BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance

Add code
Bookmark button
Alert button
Nov 13, 2022
Haotong Qin, Xudong Ma, Yifu Ding, Xiaoyang Li, Yang Zhang, Zejun Ma, Jiakai Wang, Jie Luo, Xianglong Liu

Figure 1 for BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance
Figure 2 for BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance
Figure 3 for BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance
Figure 4 for BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance
Viaarxiv icon

Exploring the Relationship between Architecture and Adversarially Robust Generalization

Add code
Bookmark button
Alert button
Sep 28, 2022
Shiyu Tang, Siyuan Liang, Ruihao Gong, Aishan Liu, Xianglong Liu, Dacheng Tao

Figure 1 for Exploring the Relationship between Architecture and Adversarially Robust Generalization
Figure 2 for Exploring the Relationship between Architecture and Adversarially Robust Generalization
Figure 3 for Exploring the Relationship between Architecture and Adversarially Robust Generalization
Figure 4 for Exploring the Relationship between Architecture and Adversarially Robust Generalization
Viaarxiv icon

Outlier Suppression: Pushing the Limit of Low-bit Transformer Language Models

Add code
Bookmark button
Alert button
Sep 27, 2022
Xiuying Wei, Yunchen Zhang, Xiangguo Zhang, Ruihao Gong, Shanghang Zhang, Qi Zhang, Fengwei Yu, Xianglong Liu

Figure 1 for Outlier Suppression: Pushing the Limit of Low-bit Transformer Language Models
Figure 2 for Outlier Suppression: Pushing the Limit of Low-bit Transformer Language Models
Figure 3 for Outlier Suppression: Pushing the Limit of Low-bit Transformer Language Models
Figure 4 for Outlier Suppression: Pushing the Limit of Low-bit Transformer Language Models
Viaarxiv icon

Towards Accurate Binary Neural Networks via Modeling Contextual Dependencies

Add code
Bookmark button
Alert button
Sep 03, 2022
Xingrun Xing, Yangguang Li, Wei Li, Wenrui Ding, Yalong Jiang, Yufeng Wang, Jing Shao, Chunlei Liu, Xianglong Liu

Figure 1 for Towards Accurate Binary Neural Networks via Modeling Contextual Dependencies
Figure 2 for Towards Accurate Binary Neural Networks via Modeling Contextual Dependencies
Figure 3 for Towards Accurate Binary Neural Networks via Modeling Contextual Dependencies
Figure 4 for Towards Accurate Binary Neural Networks via Modeling Contextual Dependencies
Viaarxiv icon

Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection

Add code
Bookmark button
Alert button
Aug 23, 2022
Simin Li, Huangxinxin Xu, Jiakai Wang, Aishan Liu, Fazhi He, Xianglong Liu, Dacheng Tao

Figure 1 for Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Figure 2 for Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Figure 3 for Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Figure 4 for Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Viaarxiv icon

Frequency Domain Model Augmentation for Adversarial Attack

Add code
Bookmark button
Alert button
Jul 12, 2022
Yuyang Long, Qilong Zhang, Boheng Zeng, Lianli Gao, Xianglong Liu, Jian Zhang, Jingkuan Song

Figure 1 for Frequency Domain Model Augmentation for Adversarial Attack
Figure 2 for Frequency Domain Model Augmentation for Adversarial Attack
Figure 3 for Frequency Domain Model Augmentation for Adversarial Attack
Figure 4 for Frequency Domain Model Augmentation for Adversarial Attack
Viaarxiv icon

Defensive Patches for Robust Recognition in the Physical World

Add code
Bookmark button
Alert button
Apr 13, 2022
Jiakai Wang, Zixin Yin, Pengfei Hu, Aishan Liu, Renshuai Tao, Haotong Qin, Xianglong Liu, Dacheng Tao

Figure 1 for Defensive Patches for Robust Recognition in the Physical World
Figure 2 for Defensive Patches for Robust Recognition in the Physical World
Figure 3 for Defensive Patches for Robust Recognition in the Physical World
Figure 4 for Defensive Patches for Robust Recognition in the Physical World
Viaarxiv icon

Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack

Add code
Bookmark button
Alert button
Mar 28, 2022
Ye Liu, Yaya Cheng, Lianli Gao, Xianglong Liu, Qilong Zhang, Jingkuan Song

Figure 1 for Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Figure 2 for Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Figure 3 for Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Figure 4 for Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Viaarxiv icon