Picture for Xiaoyong Yuan

Xiaoyong Yuan

BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection

Add code
May 06, 2024
Figure 1 for BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection
Figure 2 for BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection
Figure 3 for BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection
Figure 4 for BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection
Viaarxiv icon

Improving Channel Resilience for Task-Oriented Semantic Communications: A Unified Information Bottleneck Approach

Add code
Apr 30, 2024
Figure 1 for Improving Channel Resilience for Task-Oriented Semantic Communications: A Unified Information Bottleneck Approach
Figure 2 for Improving Channel Resilience for Task-Oriented Semantic Communications: A Unified Information Bottleneck Approach
Figure 3 for Improving Channel Resilience for Task-Oriented Semantic Communications: A Unified Information Bottleneck Approach
Viaarxiv icon

A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation

Add code
Mar 11, 2024
Figure 1 for A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation
Figure 2 for A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation
Figure 3 for A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation
Figure 4 for A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation
Viaarxiv icon

PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks

Add code
Jul 20, 2023
Figure 1 for PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks
Figure 2 for PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks
Figure 3 for PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks
Figure 4 for PATROL: Privacy-Oriented Pruning for Collaborative Inference Against Model Inversion Attacks
Viaarxiv icon

Fed-CPrompt: Contrastive Prompt for Rehearsal-Free Federated Continual Learning

Add code
Jul 10, 2023
Figure 1 for Fed-CPrompt: Contrastive Prompt for Rehearsal-Free Federated Continual Learning
Figure 2 for Fed-CPrompt: Contrastive Prompt for Rehearsal-Free Federated Continual Learning
Figure 3 for Fed-CPrompt: Contrastive Prompt for Rehearsal-Free Federated Continual Learning
Figure 4 for Fed-CPrompt: Contrastive Prompt for Rehearsal-Free Federated Continual Learning
Viaarxiv icon

FedTiny: Pruned Federated Learning Towards Specialized Tiny Models

Add code
Dec 05, 2022
Figure 1 for FedTiny: Pruned Federated Learning Towards Specialized Tiny Models
Figure 2 for FedTiny: Pruned Federated Learning Towards Specialized Tiny Models
Figure 3 for FedTiny: Pruned Federated Learning Towards Specialized Tiny Models
Figure 4 for FedTiny: Pruned Federated Learning Towards Specialized Tiny Models
Viaarxiv icon

Federated Semi-Supervised Domain Adaptation via Knowledge Transfer

Add code
Jul 25, 2022
Figure 1 for Federated Semi-Supervised Domain Adaptation via Knowledge Transfer
Figure 2 for Federated Semi-Supervised Domain Adaptation via Knowledge Transfer
Figure 3 for Federated Semi-Supervised Domain Adaptation via Knowledge Transfer
Figure 4 for Federated Semi-Supervised Domain Adaptation via Knowledge Transfer
Viaarxiv icon

Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection

Add code
Apr 22, 2022
Figure 1 for Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection
Figure 2 for Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection
Figure 3 for Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection
Figure 4 for Pay "Attention" to Adverse Weather: Weather-aware Attention-based Object Detection
Viaarxiv icon

Membership Inference Attacks and Defenses in Neural Network Pruning

Add code
Feb 07, 2022
Figure 1 for Membership Inference Attacks and Defenses in Neural Network Pruning
Figure 2 for Membership Inference Attacks and Defenses in Neural Network Pruning
Figure 3 for Membership Inference Attacks and Defenses in Neural Network Pruning
Figure 4 for Membership Inference Attacks and Defenses in Neural Network Pruning
Viaarxiv icon

FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning

Add code
Sep 08, 2021
Figure 1 for FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning
Figure 2 for FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning
Figure 3 for FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning
Figure 4 for FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning
Viaarxiv icon