Search Results for author: Chenhao Lin

Found 15 papers, 5 papers with code

Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving

1 code implementation26 Mar 2024 Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen

Deep learning-based monocular depth estimation (MDE), extensively applied in autonomous driving, is known to be vulnerable to adversarial attacks.

Adversarial Attack Autonomous Driving +1

Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval

no code implementations12 Dec 2023 Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Qian Li, Chao Shen

Furthermore, CA prevents the consequential model collapse, based on a novel metric, collapseness, which is incorporated into the optimization of perturbation.

Adversarial Defense Image Retrieval +2

Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning

no code implementations15 Oct 2023 Yulong Yang, Chenhao Lin, Xiang Ji, Qiwei Tian, Qian Li, Hongshan Yang, Zhibo Wang, Chao Shen

Instead, a one-shot adversarial augmentation prior to training is sufficient, and we name this new defense paradigm Data-centric Robust Learning (DRL).

Fairness

Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection

no code implementations7 Oct 2023 Chenhao Lin, Fangbin Yi, Hang Wang, Qian Li, Deng Jingyi, Chao Shen

Face forgery techniques have emerged as a forefront concern, and numerous detection approaches have been proposed to address this challenge.

SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning

no code implementations9 Aug 2023 Xiaobei Li, Changchun Yin, Liyue Zhu, Xiaogang Xu, Liming Fang, Run Wang, Chenhao Lin

Self-supervised learning (SSL), a paradigm harnessing unlabeled datasets to train robust encoders, has recently witnessed substantial success.

Self-Supervised Learning

Hard Adversarial Example Mining for Improving Robust Fairness

no code implementations3 Aug 2023 Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang

Adversarial training (AT) is widely considered the state-of-the-art technique for improving the robustness of deep neural networks (DNNs) against adversarial examples (AE).

Fairness

End-to-end Face-swapping via Adaptive Latent Representation Learning

no code implementations7 Mar 2023 Chenhao Lin, Pengbin Hu, Chao Shen, Qian Li

Taking full advantage of the excellent performance of StyleGAN, style transfer-based face swapping methods have been extensively investigated recently.

Attribute Face Swapping +2

Towards Benchmarking and Evaluating Deepfake Detection

no code implementations4 Mar 2022 Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li

Deepfake detection automatically recognizes the manipulated medias through the analysis of the difference between manipulated and non-altered videos.

Benchmarking DeepFake Detection +1

Spatial Dual-Modality Graph Reasoning for Key Information Extraction

2 code implementations26 Mar 2021 Hongbin Sun, Zhanghui Kuang, Xiaoyu Yue, Chenhao Lin, Wayne Zhang

In order to roundly evaluate our proposed method as well as boost the future research, we release a new dataset named WildReceipt, which is collected and annotated tailored for the evaluation of key information extraction from document images of unseen templates in the wild.

Key Information Extraction Template Matching

RobustScanner: Dynamically Enhancing Positional Clues for Robust Text Recognition

4 code implementations ECCV 2020 Xiaoyu Yue, Zhanghui Kuang, Chenhao Lin, Hongbin Sun, Wayne Zhang

Theoretically, our proposed method, dubbed \emph{RobustScanner}, decodes individual characters with dynamic ratio between context and positional clues, and utilizes more positional ones when the decoding sequences with scarce context, and thus is robust and practical.

Irregular Text Recognition Position +1

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?

1 code implementation26 Jun 2020 Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu

It is unknown whether there are any connections and common characteristics between the defenses against these two attacks.

Adversarial Defense Backdoor Attack

Object Instance Mining for Weakly Supervised Object Detection

1 code implementation4 Feb 2020 Chenhao Lin, Siwen Wang, Dongqi Xu, Yu Lu, Wayne Zhang

Weakly supervised object detection (WSOD) using only image-level annotations has attracted growing attention over the past few years.

Multiple Instance Learning Object +2

Cannot find the paper you are looking for? You can Submit a new open access paper.