Alert button
Picture for Xiaoyi Feng

Xiaoyi Feng

Alert button

Kinship Verification from rPPG using 1DCNN Attention networks

Add code
Bookmark button
Alert button
Sep 14, 2023
Xiaoting Wu, Xiaoyi Feng, Lili Liu, Constantino Álvarez Casado, Miguel Bordallo López

Figure 1 for Kinship Verification from rPPG using 1DCNN Attention networks
Figure 2 for Kinship Verification from rPPG using 1DCNN Attention networks
Figure 3 for Kinship Verification from rPPG using 1DCNN Attention networks
Figure 4 for Kinship Verification from rPPG using 1DCNN Attention networks
Viaarxiv icon

Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

Add code
Bookmark button
Alert button
Sep 13, 2023
Yang Zheng, Luca Demetrio, Antonio Emanuele Cinà, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Battista Biggio, Fabio Roli

Figure 1 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 2 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 3 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 4 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Viaarxiv icon

Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference

Add code
Bookmark button
Alert button
Aug 31, 2021
Yang Zheng, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Maura Pintor, Battista Biggio, Fabio Roli

Figure 1 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 2 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 3 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 4 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Viaarxiv icon

Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction

Add code
Bookmark button
Alert button
May 18, 2021
Ruijing Yang, Ziyu Guan, Zitong Yu, Guoying Zhao, Xiaoyi Feng, Jinye Peng

Figure 1 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 2 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 3 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 4 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Viaarxiv icon

Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?

Add code
Bookmark button
Alert button
Jul 07, 2020
Roberto Casula, Giulia Orrù, Daniele Angioni, Xiaoyi Feng, Gian Luca Marcialis, Fabio Roli

Figure 1 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 2 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 3 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 4 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Viaarxiv icon

Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition

Add code
Bookmark button
Alert button
Jun 17, 2020
Zhaoqiang Xia, Wei Peng, Huai-Qian Khor, Xiaoyi Feng, Guoying Zhao

Figure 1 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 2 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 3 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 4 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Viaarxiv icon

Deep Neural Rejection against Adversarial Examples

Add code
Bookmark button
Alert button
Oct 01, 2019
Angelo Sotgiu, Ambra Demontis, Marco Melis, Battista Biggio, Giorgio Fumera, Xiaoyi Feng, Fabio Roli

Figure 1 for Deep Neural Rejection against Adversarial Examples
Figure 2 for Deep Neural Rejection against Adversarial Examples
Figure 3 for Deep Neural Rejection against Adversarial Examples
Figure 4 for Deep Neural Rejection against Adversarial Examples
Viaarxiv icon

Audio-Visual Kinship Verification

Add code
Bookmark button
Alert button
Jun 24, 2019
Xiaoting Wu, Eric Granger, Xiaoyi Feng

Figure 1 for Audio-Visual Kinship Verification
Figure 2 for Audio-Visual Kinship Verification
Figure 3 for Audio-Visual Kinship Verification
Figure 4 for Audio-Visual Kinship Verification
Viaarxiv icon

3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis

Add code
Bookmark button
Alert button
Mar 27, 2019
Lei Li, Zhaoqiang Xia, Xiaoyue Jiang, Yupeng Ma, Fabio Roli, Xiaoyi Feng

Figure 1 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 2 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 3 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 4 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Viaarxiv icon