Alert button
Picture for Yingying Chen

Yingying Chen

Alert button

DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models

Add code
Bookmark button
Alert button
Feb 05, 2024
Yang Sui, Huy Phan, Jinqi Xiao, Tianfang Zhang, Zijie Tang, Cong Shi, Yan Wang, Yingying Chen, Bo Yuan

Viaarxiv icon

Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks

Add code
Bookmark button
Alert button
Oct 11, 2023
Chen Chen, Junqing Zhang, Yingying Chen

Figure 1 for Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Figure 2 for Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Figure 3 for Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Figure 4 for Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Viaarxiv icon

AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models

Add code
Bookmark button
Alert button
Sep 13, 2023
Zhaopeng Gu, Bingke Zhu, Guibo Zhu, Yingying Chen, Ming Tang, Jinqiao Wang

Figure 1 for AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models
Figure 2 for AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models
Figure 3 for AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models
Figure 4 for AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models
Viaarxiv icon

Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples

Add code
Bookmark button
Alert button
Aug 10, 2023
Qiufan Ji, Lin Wang, Cong Shi, Shengshan Hu, Yingying Chen, Lichao Sun

Figure 1 for Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Figure 2 for Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Figure 3 for Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Figure 4 for Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Viaarxiv icon

EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers

Add code
Bookmark button
Alert button
Dec 23, 2022
Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, Nitesh Saxena

Figure 1 for EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers
Figure 2 for EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers
Figure 3 for EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers
Figure 4 for EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers
Viaarxiv icon

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples

Add code
Bookmark button
Alert button
Nov 10, 2022
Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren

Figure 1 for Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Figure 2 for Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Figure 3 for Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Figure 4 for Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Viaarxiv icon

View-Disentangled Transformer for Brain Lesion Detection

Add code
Bookmark button
Alert button
Sep 20, 2022
Haofeng Li, Junjia Huang, Guanbin Li, Zhou Liu, Yihong Zhong, Yingying Chen, Yunfei Wang, Xiang Wan

Figure 1 for View-Disentangled Transformer for Brain Lesion Detection
Figure 2 for View-Disentangled Transformer for Brain Lesion Detection
Figure 3 for View-Disentangled Transformer for Brain Lesion Detection
Figure 4 for View-Disentangled Transformer for Brain Lesion Detection
Viaarxiv icon