Alert button
Picture for Yong Jiang

Yong Jiang

Alert button

Improving Adversarial Robustness via Channel-wise Activation Suppressing

Add code
Bookmark button
Alert button
Mar 11, 2021
Yang Bai, Yuyuan Zeng, Yong Jiang, Shu-Tao Xia, Xingjun Ma, Yisen Wang

Figure 1 for Improving Adversarial Robustness via Channel-wise Activation Suppressing
Figure 2 for Improving Adversarial Robustness via Channel-wise Activation Suppressing
Figure 3 for Improving Adversarial Robustness via Channel-wise Activation Suppressing
Figure 4 for Improving Adversarial Robustness via Channel-wise Activation Suppressing
Viaarxiv icon

Hidden Backdoor Attack against Semantic Segmentation Models

Add code
Bookmark button
Alert button
Mar 06, 2021
Yiming Li, Yanjie Li, Yalei Lv, Baoyuan Wu, Yong Jiang, Shu-Tao Xia

Figure 1 for Hidden Backdoor Attack against Semantic Segmentation Models
Figure 2 for Hidden Backdoor Attack against Semantic Segmentation Models
Figure 3 for Hidden Backdoor Attack against Semantic Segmentation Models
Viaarxiv icon

Loss Function Discovery for Object Detection via Convergence-Simulation Driven Search

Add code
Bookmark button
Alert button
Feb 09, 2021
Peidong Liu, Gengwei Zhang, Bochao Wang, Hang Xu, Xiaodan Liang, Yong Jiang, Zhenguo Li

Figure 1 for Loss Function Discovery for Object Detection via Convergence-Simulation Driven Search
Figure 2 for Loss Function Discovery for Object Detection via Convergence-Simulation Driven Search
Figure 3 for Loss Function Discovery for Object Detection via Convergence-Simulation Driven Search
Figure 4 for Loss Function Discovery for Object Detection via Convergence-Simulation Driven Search
Viaarxiv icon

FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques

Add code
Bookmark button
Alert button
Dec 03, 2020
Han Qiu, Yi Zeng, Tianwei Zhang, Yong Jiang, Meikang Qiu

Figure 1 for FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques
Figure 2 for FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques
Figure 3 for FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques
Figure 4 for FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques
Viaarxiv icon

An Investigation of Potential Function Designs for Neural CRF

Add code
Bookmark button
Alert button
Nov 11, 2020
Zechuan Hu, Yong Jiang, Nguyen Bach, Tao Wang, Zhongqiang Huang, Fei Huang, Kewei Tu

Figure 1 for An Investigation of Potential Function Designs for Neural CRF
Figure 2 for An Investigation of Potential Function Designs for Neural CRF
Figure 3 for An Investigation of Potential Function Designs for Neural CRF
Figure 4 for An Investigation of Potential Function Designs for Neural CRF
Viaarxiv icon

Neural Latent Dependency Model for Sequence Labeling

Add code
Bookmark button
Alert button
Nov 10, 2020
Yang Zhou, Yong Jiang, Zechuan Hu, Kewei Tu

Figure 1 for Neural Latent Dependency Model for Sequence Labeling
Figure 2 for Neural Latent Dependency Model for Sequence Labeling
Figure 3 for Neural Latent Dependency Model for Sequence Labeling
Figure 4 for Neural Latent Dependency Model for Sequence Labeling
Viaarxiv icon

Reducing the Annotation Effort for Video Object Segmentation Datasets

Add code
Bookmark button
Alert button
Nov 02, 2020
Paul Voigtlaender, Lishu Luo, Chun Yuan, Yong Jiang, Bastian Leibe

Figure 1 for Reducing the Annotation Effort for Video Object Segmentation Datasets
Figure 2 for Reducing the Annotation Effort for Video Object Segmentation Datasets
Figure 3 for Reducing the Annotation Effort for Video Object Segmentation Datasets
Figure 4 for Reducing the Annotation Effort for Video Object Segmentation Datasets
Viaarxiv icon

Second-Order Unsupervised Neural Dependency Parsing

Add code
Bookmark button
Alert button
Oct 28, 2020
Songlin Yang, Yong Jiang, Wenjuan Han, Kewei Tu

Figure 1 for Second-Order Unsupervised Neural Dependency Parsing
Figure 2 for Second-Order Unsupervised Neural Dependency Parsing
Figure 3 for Second-Order Unsupervised Neural Dependency Parsing
Figure 4 for Second-Order Unsupervised Neural Dependency Parsing
Viaarxiv icon

Backdoor Attack against Speaker Verification

Add code
Bookmark button
Alert button
Oct 25, 2020
Tongqing Zhai, Yiming Li, Ziqi Zhang, Baoyuan Wu, Yong Jiang, Shu-Tao Xia

Figure 1 for Backdoor Attack against Speaker Verification
Figure 2 for Backdoor Attack against Speaker Verification
Figure 3 for Backdoor Attack against Speaker Verification
Viaarxiv icon