Search Results for author: Chenchen Zhao

Found 7 papers, 3 papers with code

Multichannel consecutive data cross-extraction with 1DCNN-attention for diagnosis of power transformer

no code implementations11 Oct 2023 Wei Zheng, Guogang Zhang, Chenchen Zhao, Qianqian Zhu

Power transformer plays a critical role in grid infrastructure, and its diagnosis is paramount for maintaining stable operation.

DiffGuard: Semantic Mismatch-Guided Out-of-Distribution Detection using Pre-trained Diffusion Models

1 code implementation ICCV 2023 Ruiyuan Gao, Chenchen Zhao, Lanqing Hong, Qiang Xu

There is a recent work that directly applies it to OOD detection, which employs a conditional Generative Adversarial Network (cGAN) to enlarge semantic mismatch in the image space.

Generative Adversarial Network Out-of-Distribution Detection

HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image Generation

1 code implementation ICCV 2023 Xuan Ju, Ailing Zeng, Chenchen Zhao, Jianan Wang, Lei Zhang, Qiang Xu

While such a plug-and-play approach is appealing, the inevitable and uncertain conflicts between the original images produced from the frozen SD branch and the given condition incur significant challenges for the learnable branch, which essentially conducts image feature editing for condition enforcement.

Denoising Image Generation

Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring

no code implementations21 Dec 2020 Chenchen Zhao, Hao Li

Existing pixel-level adversarial attacks on neural networks may be deficient in real scenarios, since pixel-level changes on the data cannot be fully delivered to the neural network after camera capture and multiple image preprocessing steps.

Adversarial Attack

Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution

no code implementations21 Dec 2020 Chenchen Zhao, Hao Li

Existing deep-learning based monocular orientation estimation algorithms faces the problem of confusion between the anterior and posterior parts of the objects, caused by the feature similarity of such parts in typical objects in traffic scenes such as cars and pedestrians.

Decision Making

Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks

no code implementations21 Dec 2020 Chenchen Zhao, Hao Li

Then an attack method based on Strict Pooling Manipulation (SPM) which is an instantiation of the SLOM spirit is designed to effectively realize both type I and type II adversarial attacks on a target CNN.

Adversarial Attack Dimensionality Reduction

Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward

1 code implementation24 Sep 2019 Chenchen Zhao, Yeqiang Qian, Ming Yang

The 2D and 3D dimensions of pedestrians are determined from the camera captures and further utilized through two feedforward links connected to the orientation estimator.

Autonomous Driving Collision Avoidance

Cannot find the paper you are looking for? You can Submit a new open access paper.