Alert button
Picture for Xiaoqian Chen

Xiaoqian Chen

Alert button

Universal Perturbation-based Secret Key-Controlled Data Hiding

Add code
Bookmark button
Alert button
Nov 03, 2023
Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Viaarxiv icon

Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations

Add code
Bookmark button
Alert button
Jul 16, 2023
Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Figure 1 for Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations
Figure 2 for Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations
Figure 3 for Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations
Figure 4 for Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations
Viaarxiv icon

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World

Add code
Bookmark button
Alert button
Jul 14, 2023
Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen

Figure 1 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 2 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 3 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 4 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Viaarxiv icon

Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation

Add code
Bookmark button
Alert button
May 12, 2023
Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Figure 1 for Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation
Figure 2 for Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation
Figure 3 for Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation
Figure 4 for Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation
Viaarxiv icon

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications

Add code
Bookmark button
Alert button
Apr 20, 2023
Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen

Figure 1 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 2 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 3 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 4 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Viaarxiv icon

RecFNO: a resolution-invariant flow and heat field reconstruction method from sparse observations via Fourier neural operator

Add code
Bookmark button
Alert button
Feb 20, 2023
Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Weien Zhou, Wen Yao, Yunyang Zhang

Figure 1 for RecFNO: a resolution-invariant flow and heat field reconstruction method from sparse observations via Fourier neural operator
Figure 2 for RecFNO: a resolution-invariant flow and heat field reconstruction method from sparse observations via Fourier neural operator
Figure 3 for RecFNO: a resolution-invariant flow and heat field reconstruction method from sparse observations via Fourier neural operator
Figure 4 for RecFNO: a resolution-invariant flow and heat field reconstruction method from sparse observations via Fourier neural operator
Viaarxiv icon

A Survey on Physical Adversarial Attack in Computer Vision

Add code
Bookmark button
Alert button
Sep 28, 2022
Donghua Wang, Wen Yao, Tingsong Jiang, Guijiang Tang, Xiaoqian Chen

Figure 1 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 2 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 3 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 4 for A Survey on Physical Adversarial Attack in Computer Vision
Viaarxiv icon

A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design

Add code
Bookmark button
Alert button
Aug 15, 2022
Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Figure 1 for A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Figure 2 for A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Figure 3 for A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Figure 4 for A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Viaarxiv icon

Algorithms for Bayesian network modeling and reliability inference of complex multistate systems: Part II-Dependent systems

Add code
Bookmark button
Alert button
Apr 04, 2022
Xiaohu Zheng, Wen Yao, Xiaoqian Chen

Figure 1 for Algorithms for Bayesian network modeling and reliability inference of complex multistate systems: Part II-Dependent systems
Figure 2 for Algorithms for Bayesian network modeling and reliability inference of complex multistate systems: Part II-Dependent systems
Figure 3 for Algorithms for Bayesian network modeling and reliability inference of complex multistate systems: Part II-Dependent systems
Figure 4 for Algorithms for Bayesian network modeling and reliability inference of complex multistate systems: Part II-Dependent systems
Viaarxiv icon

Contrastive Enhancement Using Latent Prototype for Few-Shot Segmentation

Add code
Bookmark button
Alert button
Mar 08, 2022
Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Wen Yao, Yunyang Zhang, Xiaohu Zheng

Figure 1 for Contrastive Enhancement Using Latent Prototype for Few-Shot Segmentation
Figure 2 for Contrastive Enhancement Using Latent Prototype for Few-Shot Segmentation
Figure 3 for Contrastive Enhancement Using Latent Prototype for Few-Shot Segmentation
Figure 4 for Contrastive Enhancement Using Latent Prototype for Few-Shot Segmentation
Viaarxiv icon