Picture for Yuan He

Yuan He

Unrestricted Adversarial Attacks on ImageNet Competition

Add code
Oct 25, 2021
Figure 1 for Unrestricted Adversarial Attacks on ImageNet Competition
Figure 2 for Unrestricted Adversarial Attacks on ImageNet Competition
Figure 3 for Unrestricted Adversarial Attacks on ImageNet Competition
Viaarxiv icon

Adversarial Attacks on ML Defense Models Competition

Add code
Oct 15, 2021
Figure 1 for Adversarial Attacks on ML Defense Models Competition
Figure 2 for Adversarial Attacks on ML Defense Models Competition
Figure 3 for Adversarial Attacks on ML Defense Models Competition
Figure 4 for Adversarial Attacks on ML Defense Models Competition
Viaarxiv icon

Prior-Guided Deep Interference Mitigation for FMCW Radars

Add code
Aug 30, 2021
Figure 1 for Prior-Guided Deep Interference Mitigation for FMCW Radars
Figure 2 for Prior-Guided Deep Interference Mitigation for FMCW Radars
Figure 3 for Prior-Guided Deep Interference Mitigation for FMCW Radars
Figure 4 for Prior-Guided Deep Interference Mitigation for FMCW Radars
Viaarxiv icon

AdvDrop: Adversarial Attack to DNNs by Dropping Information

Add code
Aug 20, 2021
Figure 1 for AdvDrop: Adversarial Attack to DNNs by Dropping Information
Figure 2 for AdvDrop: Adversarial Attack to DNNs by Dropping Information
Figure 3 for AdvDrop: Adversarial Attack to DNNs by Dropping Information
Figure 4 for AdvDrop: Adversarial Attack to DNNs by Dropping Information
Viaarxiv icon

DRDF: Determining the Importance of Different Multimodal Information with Dual-Router Dynamic Framework

Add code
Jul 21, 2021
Figure 1 for DRDF: Determining the Importance of Different Multimodal Information with Dual-Router Dynamic Framework
Figure 2 for DRDF: Determining the Importance of Different Multimodal Information with Dual-Router Dynamic Framework
Figure 3 for DRDF: Determining the Importance of Different Multimodal Information with Dual-Router Dynamic Framework
Figure 4 for DRDF: Determining the Importance of Different Multimodal Information with Dual-Router Dynamic Framework
Viaarxiv icon

RAMS-Trans: Recurrent Attention Multi-scale Transformer forFine-grained Image Recognition

Add code
Jul 17, 2021
Figure 1 for RAMS-Trans: Recurrent Attention Multi-scale Transformer forFine-grained Image Recognition
Figure 2 for RAMS-Trans: Recurrent Attention Multi-scale Transformer forFine-grained Image Recognition
Figure 3 for RAMS-Trans: Recurrent Attention Multi-scale Transformer forFine-grained Image Recognition
Figure 4 for RAMS-Trans: Recurrent Attention Multi-scale Transformer forFine-grained Image Recognition
Viaarxiv icon

Monocular 3D Object Detection: An Extrinsic Parameter Free Approach

Add code
Jun 30, 2021
Figure 1 for Monocular 3D Object Detection: An Extrinsic Parameter Free Approach
Figure 2 for Monocular 3D Object Detection: An Extrinsic Parameter Free Approach
Figure 3 for Monocular 3D Object Detection: An Extrinsic Parameter Free Approach
Figure 4 for Monocular 3D Object Detection: An Extrinsic Parameter Free Approach
Viaarxiv icon

Towards Robust Vision Transformer

Add code
May 26, 2021
Figure 1 for Towards Robust Vision Transformer
Figure 2 for Towards Robust Vision Transformer
Figure 3 for Towards Robust Vision Transformer
Figure 4 for Towards Robust Vision Transformer
Viaarxiv icon

Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning

Add code
Apr 06, 2021
Figure 1 for Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning
Figure 2 for Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning
Figure 3 for Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning
Figure 4 for Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning
Viaarxiv icon

QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval

Add code
Mar 23, 2021
Figure 1 for QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Figure 2 for QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Figure 3 for QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Figure 4 for QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Viaarxiv icon