Search Results for author: Junjian Li

Found 3 papers, 0 papers with code

A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives

no code implementations3 Jul 2023 Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang

Then, to attain strong stealthiness, we incorporate Fourier Transform and Discrete Cosine Transform to mix the poisoned image and clean image in the frequency domain.

Backdoor Attack

Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline

no code implementations2 Jun 2022 Junjian Li, Honglong Chen

Most of the vision devices are equipped with image signal processing (ISP) pipeline to implement RAW-to-RGB transformations and embedded into data preprocessing module for efficient image processing.

Adversarial Attack

Edge Data Based Trailer Inception Probabilistic Matrix Factorization for Context-Aware Movie Recommendation

no code implementations16 Feb 2022 Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia

As an effective way to alleviate information overload, recommender system can improve the quality of various services by adding application data generated by users on edge devices, such as visual and textual information, on the basis of sparse rating data.

Movie Recommendation Recommendation Systems

Cannot find the paper you are looking for? You can Submit a new open access paper.