Picture for Xiaofei Xie

Xiaofei Xie

Nanyang Technological University, Singapore

Independent Reinforcement Learning for Weakly Cooperative Multiagent Traffic Control Problem

Add code
Apr 22, 2021
Figure 1 for Independent Reinforcement Learning for Weakly Cooperative Multiagent Traffic Control Problem
Figure 2 for Independent Reinforcement Learning for Weakly Cooperative Multiagent Traffic Control Problem
Figure 3 for Independent Reinforcement Learning for Weakly Cooperative Multiagent Traffic Control Problem
Figure 4 for Independent Reinforcement Learning for Weakly Cooperative Multiagent Traffic Control Problem
Viaarxiv icon

Neuron Coverage-Guided Domain Generalization

Add code
Feb 27, 2021
Figure 1 for Neuron Coverage-Guided Domain Generalization
Figure 2 for Neuron Coverage-Guided Domain Generalization
Figure 3 for Neuron Coverage-Guided Domain Generalization
Figure 4 for Neuron Coverage-Guided Domain Generalization
Viaarxiv icon

DeepRepair: Style-Guided Repairing for DNNs in the Real-world Operational Environment

Add code
Nov 19, 2020
Figure 1 for DeepRepair: Style-Guided Repairing for DNNs in the Real-world Operational Environment
Figure 2 for DeepRepair: Style-Guided Repairing for DNNs in the Real-world Operational Environment
Figure 3 for DeepRepair: Style-Guided Repairing for DNNs in the Real-world Operational Environment
Figure 4 for DeepRepair: Style-Guided Repairing for DNNs in the Real-world Operational Environment
Viaarxiv icon

Bias Field Poses a Threat to DNN-based X-Ray Recognition

Add code
Sep 19, 2020
Figure 1 for Bias Field Poses a Threat to DNN-based X-Ray Recognition
Figure 2 for Bias Field Poses a Threat to DNN-based X-Ray Recognition
Figure 3 for Bias Field Poses a Threat to DNN-based X-Ray Recognition
Figure 4 for Bias Field Poses a Threat to DNN-based X-Ray Recognition
Viaarxiv icon

EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining

Add code
Sep 19, 2020
Figure 1 for EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining
Figure 2 for EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining
Figure 3 for EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining
Figure 4 for EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining
Viaarxiv icon

Adversarial Exposure Attack on Diabetic Retinopathy Imagery

Add code
Sep 19, 2020
Figure 1 for Adversarial Exposure Attack on Diabetic Retinopathy Imagery
Figure 2 for Adversarial Exposure Attack on Diabetic Retinopathy Imagery
Figure 3 for Adversarial Exposure Attack on Diabetic Retinopathy Imagery
Figure 4 for Adversarial Exposure Attack on Diabetic Retinopathy Imagery
Viaarxiv icon

FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise

Add code
Sep 19, 2020
Figure 1 for FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise
Figure 2 for FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise
Figure 3 for FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise
Figure 4 for FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise
Viaarxiv icon

It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception

Add code
Sep 19, 2020
Figure 1 for It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception
Figure 2 for It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception
Figure 3 for It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception
Figure 4 for It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception
Viaarxiv icon

Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems

Add code
Sep 15, 2020
Figure 1 for Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems
Figure 2 for Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems
Figure 3 for Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems
Figure 4 for Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems
Viaarxiv icon

Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack

Add code
Jul 14, 2020
Figure 1 for Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Figure 2 for Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Figure 3 for Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Figure 4 for Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Viaarxiv icon