Search Results for author: Cong Shi

Found 11 papers, 4 papers with code

DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models

no code implementations5 Feb 2024 Yang Sui, Huy Phan, Jinqi Xiao, Tianfang Zhang, Zijie Tang, Cong Shi, Yan Wang, Yingying Chen, Bo Yuan

In this paper, for the first time, we systematically explore the detectability of the poisoned noise input for the backdoored diffusion models, an important performance metric yet little explored in the existing works.

Backdoor Attack

Classification with neural networks with quadratic decision functions

no code implementations19 Jan 2024 Leon Frischauf, Otmar Scherzer, Cong Shi

Neural network with quadratic decision functions have been introduced as alternatives to standard neural networks with affine linear one.

Classification

Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples

1 code implementation ICCV 2023 Qiufan Ji, Lin Wang, Cong Shi, Shengshan Hu, Yingying Chen, Lichao Sun

In this paper, we first establish a comprehensive, and rigorous point cloud adversarial robustness benchmark to evaluate adversarial robustness, which can provide a detailed understanding of the effects of the defense and attack methods.

Adversarial Robustness Benchmarking

Personalized Pricing with Invalid Instrumental Variables: Identification, Estimation, and Policy Learning

no code implementations24 Feb 2023 Rui Miao, Zhengling Qi, Cong Shi, Lin Lin

Specifically, relying on the structural models of revenue and price, we establish the identifiability condition of an optimal pricing strategy under endogeneity with the help of invalid instrumental variables.

Causal Inference Econometrics

PASTA: Pessimistic Assortment Optimization

no code implementations8 Feb 2023 Juncheng Dong, Weibin Mo, Zhengling Qi, Cong Shi, Ethan X. Fang, Vahid Tarokh

The objective is to use the offline dataset to find an optimal assortment.

Simultaneous Monitoring of Multiple People's Vital Sign Leveraging a Single Phased-MIMO Radar

no code implementations15 Oct 2021 Zhaoyi Xu, Cong Shi, Tianfang Zhang, ShuPing Li, Yichao Yuan, Chung-Tse Michael Wu, Yingying Chen, Athina Petropulu

Based on the designed TDM phased-MIMO radar, we develop a system to automatically localize multiple human subjects and estimate their vital signs.

Neural Network Activation Quantization with Bitwise Information Bottlenecks

1 code implementation9 Jun 2020 Xichuan Zhou, Kui Liu, Cong Shi, Haijun Liu, Ji Liu

Recent researches on information bottleneck shed new light on the continuous attempts to open the black box of neural signal encoding.

Computational Efficiency Quantization

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model

no code implementations26 Apr 2020 Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan

These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).

Adversarial Attack

Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems

no code implementations4 Mar 2020 Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan

As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.

Adversarial Attack Room Impulse Response (RIR) +1

Cannot find the paper you are looking for? You can Submit a new open access paper.