Alert button
Picture for Yingqi Liu

Yingqi Liu

Alert button

DECK: Model Hardening for Defending Pervasive Backdoors

Add code
Bookmark button
Alert button
Jun 18, 2022
Guanhong Tao, Yingqi Liu, Siyuan Cheng, Shengwei An, Zhuo Zhang, Qiuling Xu, Guangyu Shen, Xiangyu Zhang

Figure 1 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 2 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 3 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 4 for DECK: Model Hardening for Defending Pervasive Backdoors
Viaarxiv icon

Blueprint Separable Residual Network for Efficient Image Super-Resolution

Add code
Bookmark button
Alert button
May 12, 2022
Zheyuan Li, Yingqi Liu, Xiangyu Chen, Haoming Cai, Jinjin Gu, Yu Qiao, Chao Dong

Figure 1 for Blueprint Separable Residual Network for Efficient Image Super-Resolution
Figure 2 for Blueprint Separable Residual Network for Efficient Image Super-Resolution
Figure 3 for Blueprint Separable Residual Network for Efficient Image Super-Resolution
Figure 4 for Blueprint Separable Residual Network for Efficient Image Super-Resolution
Viaarxiv icon

NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results

Add code
Bookmark button
Alert button
May 11, 2022
Yawei Li, Kai Zhang, Radu Timofte, Luc Van Gool, Fangyuan Kong, Mingxi Li, Songwei Liu, Zongcai Du, Ding Liu, Chenhui Zhou, Jingyi Chen, Qingrui Han, Zheyuan Li, Yingqi Liu, Xiangyu Chen, Haoming Cai, Yu Qiao, Chao Dong, Long Sun, Jinshan Pan, Yi Zhu, Zhikai Zong, Xiaoxiao Liu, Zheng Hui, Tao Yang, Peiran Ren, Xuansong Xie, Xian-Sheng Hua, Yanbo Wang, Xiaozhong Ji, Chuming Lin, Donghao Luo, Ying Tai, Chengjie Wang, Zhizhong Zhang, Yuan Xie, Shen Cheng, Ziwei Luo, Lei Yu, Zhihong Wen, Qi Wu1, Youwei Li, Haoqiang Fan, Jian Sun, Shuaicheng Liu, Yuanfei Huang, Meiguang Jin, Hua Huang, Jing Liu, Xinjian Zhang, Yan Wang, Lingshun Long, Gen Li, Yuanfan Zhang, Zuowei Cao, Lei Sun, Panaetov Alexander, Yucong Wang, Minjie Cai, Li Wang, Lu Tian, Zheyuan Wang, Hongbing Ma, Jie Liu, Chao Chen, Yidong Cai, Jie Tang, Gangshan Wu, Weiran Wang, Shirui Huang, Honglei Lu, Huan Liu, Keyan Wang, Jun Chen, Shi Chen, Yuchun Miao, Zimo Huang, Lefei Zhang, Mustafa Ayazoğlu, Wei Xiong, Chengyi Xiong, Fei Wang, Hao Li, Ruimian Wen, Zhijing Yang, Wenbin Zou, Weixin Zheng, Tian Ye, Yuncheng Zhang, Xiangzhen Kong, Aditya Arora, Syed Waqas Zamir, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Dandan Gaoand Dengwen Zhouand Qian Ning, Jingzhu Tang, Han Huang, Yufei Wang, Zhangheng Peng, Haobo Li, Wenxue Guan, Shenghua Gong, Xin Li, Jun Liu, Wanjun Wang, Dengwen Zhou, Kun Zeng, Hanjiang Lin, Xinyu Chen, Jinsheng Fang

Figure 1 for NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results
Figure 2 for NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results
Figure 3 for NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results
Figure 4 for NTIRE 2022 Challenge on Efficient Super-Resolution: Methods and Results
Viaarxiv icon

Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense

Add code
Bookmark button
Alert button
Feb 11, 2022
Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang

Figure 1 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 2 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 3 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 4 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Viaarxiv icon

EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry

Add code
Bookmark button
Alert button
Mar 17, 2021
Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang

Figure 1 for EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Figure 2 for EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Figure 3 for EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Figure 4 for EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry
Viaarxiv icon

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization

Add code
Bookmark button
Alert button
Feb 09, 2021
Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang

Figure 1 for Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Figure 2 for Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Figure 3 for Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Figure 4 for Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Viaarxiv icon

Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification

Add code
Bookmark button
Alert button
Jan 04, 2021
Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang

Figure 1 for Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification
Figure 2 for Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification
Figure 3 for Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification
Figure 4 for Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification
Viaarxiv icon

Black-box Adversarial Sample Generation Based on Differential Evolution

Add code
Bookmark button
Alert button
Jul 30, 2020
Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang

Figure 1 for Black-box Adversarial Sample Generation Based on Differential Evolution
Figure 2 for Black-box Adversarial Sample Generation Based on Differential Evolution
Figure 3 for Black-box Adversarial Sample Generation Based on Differential Evolution
Figure 4 for Black-box Adversarial Sample Generation Based on Differential Evolution
Viaarxiv icon

Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples

Add code
Bookmark button
Alert button
Oct 27, 2018
Guanhong Tao, Shiqing Ma, Yingqi Liu, Xiangyu Zhang

Figure 1 for Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples
Viaarxiv icon