Search Results for author: Fu Wang

Found 7 papers, 4 papers with code

Controllable seismic velocity synthesis using generative diffusion models

no code implementations9 Feb 2024 Fu Wang, Xinquan Huang, Tariq Alkhalifah

Accurate seismic velocity estimations are vital to understanding Earth's subsurface structures, assessing natural resources, and evaluating seismic hazards.

A prior regularized full waveform inversion using generative diffusion models

no code implementations22 Jun 2023 Fu Wang, Xinquan Huang, Tariq Alkhalifah

Specifically, we pre-train a diffusion model in a fully unsupervised manner on a prior velocity model distribution that represents our expectations of the subsurface and then adapt it to the seismic observations by incorporating the FWI into the sampling process of the generative diffusion models.

Model-Agnostic Reachability Analysis on Deep Neural Networks

no code implementations3 Apr 2023 Chi Zhang, Wenjie Ruan, Fu Wang, Peipei Xu, Geyong Min, Xiaowei Huang

Verification plays an essential role in the formal analysis of safety-critical systems.

Towards Verifying the Geometric Robustness of Large-scale Neural Networks

1 code implementation29 Jan 2023 Fu Wang, Peipei Xu, Wenjie Ruan, Xiaowei Huang

Deep neural networks (DNNs) are known to be vulnerable to adversarial geometric transformation.

Dynamic Efficient Adversarial Training Guided by Gradient Magnitude

1 code implementation4 Mar 2021 Fu Wang, Yanghao Zhang, Yanbin Zheng, Wenjie Ruan

Therefore, based on the magnitude of the gradient, we propose a general acceleration strategy, M+ acceleration, which enables an automatic and highly effective method of adjusting the training procedure.

Fooling Object Detectors: Adversarial Attacks by Half-Neighbor Masks

1 code implementation4 Jan 2021 Yanghao Zhang, Fu Wang, Wenjie Ruan

Although there are a great number of adversarial attacks on deep learning based classifiers, how to attack object detection systems has been rarely studied.

Object object-detection +1

Generalizing Universal Adversarial Attacks Beyond Additive Perturbations

2 code implementations15 Oct 2020 Yanghao Zhang, Wenjie Ruan, Fu Wang, Xiaowei Huang

Extensive experiments are conducted on CIFAR-10 and ImageNet datasets with six deep neural network models including GoogleLeNet, VGG16/19, ResNet101/152, and DenseNet121.

Adversarial Attack

Cannot find the paper you are looking for? You can Submit a new open access paper.