Alert button
Picture for Xiaofei Xie

Xiaofei Xie

Alert button

Nanyang Technological University, Singapore

FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise

Sep 19, 2020
Yihao Huang, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Lei Ma, Weikai Miao, Yang Liu, Geguang Pu

Figure 1 for FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise
Figure 2 for FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise
Figure 3 for FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise
Figure 4 for FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise
Viaarxiv icon

It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception

Sep 19, 2020
Liming Zhai, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Lei Ma, Wei Feng, Shengchao Qin, Yang Liu

Figure 1 for It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception
Figure 2 for It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception
Figure 3 for It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception
Figure 4 for It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception
Viaarxiv icon

Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems

Sep 15, 2020
Haoliang Li, Yufei Wang, Xiaofei Xie, Yang Liu, Shiqi Wang, Renjie Wan, Lap-Pui Chau, Alex C. Kot

Figure 1 for Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems
Figure 2 for Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems
Figure 3 for Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems
Figure 4 for Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems
Viaarxiv icon

Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack

Jul 14, 2020
Yupeng Cheng, Qing Guo, Felix Juefei-Xu, Xiaofei Xie, Shang-Wei Lin, Weisi Lin, Wei Feng, Yang Liu

Figure 1 for Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Figure 2 for Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Figure 3 for Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Figure 4 for Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Viaarxiv icon

DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms

Jun 13, 2020
Hua Qi, Qing Guo, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Wei Feng, Yang Liu, Jianjun Zhao

Viaarxiv icon

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction

Jun 13, 2020
Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu

Figure 1 for FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction
Figure 2 for FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction
Figure 3 for FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction
Figure 4 for FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction
Viaarxiv icon

Automatic Code Summarization via Multi-dimensional Semantic Fusing in GNN

Jun 09, 2020
Shangqing Liu, Yu Chen, Xiaofei Xie, Jing Kai Siow, Yang Liu

Figure 1 for Automatic Code Summarization via Multi-dimensional Semantic Fusing in GNN
Figure 2 for Automatic Code Summarization via Multi-dimensional Semantic Fusing in GNN
Figure 3 for Automatic Code Summarization via Multi-dimensional Semantic Fusing in GNN
Figure 4 for Automatic Code Summarization via Multi-dimensional Semantic Fusing in GNN
Viaarxiv icon

Stealing Deep Reinforcement Learning Models for Fun and Profit

Jun 09, 2020
Kangjie Chen, Tianwei Zhang, Xiaofei Xie, Yang Liu

Figure 1 for Stealing Deep Reinforcement Learning Models for Fun and Profit
Figure 2 for Stealing Deep Reinforcement Learning Models for Fun and Profit
Figure 3 for Stealing Deep Reinforcement Learning Models for Fun and Profit
Figure 4 for Stealing Deep Reinforcement Learning Models for Fun and Profit
Viaarxiv icon

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning

May 14, 2020
Jianwen Sun, Tianwei Zhang, Xiaofei Xie, Lei Ma, Yan Zheng, Kangjie Chen, Yang Liu

Figure 1 for Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning
Figure 2 for Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning
Figure 3 for Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning
Figure 4 for Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning
Viaarxiv icon

Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty

Apr 24, 2020
Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun

Figure 1 for Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Figure 2 for Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Figure 3 for Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Figure 4 for Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty
Viaarxiv icon