no code implementations • 18 Aug 2020 • Li-Na Wang, Rui Tang, Yawei Yue, Xingshu Chen, Wei Wang, Yi Zhu, Xuemei Zeng
The vulnerability of deep neural networks (DNNs) to adversarial attack, which is an attack that can mislead state-of-the-art classifiers into making an incorrect classification with high confidence by deliberately perturbing the original inputs, raises concerns about the robustness of DNNs to such attacks.
1 code implementation • 21 Jan 2019 • Yanzhen Ren, Dengkai Liu, Qiaochu Xiong, Jianming Fu, Li-Na Wang
The proposed scheme has better detection accuracy for three different AAC steganographic schemes and MP3Stego than the state-of-arts steganalysis schemes which are based on traditional hand-crafted or CNN-based feature.
Multimedia
no code implementations • 13 Apr 2017 • Junyu Dong, Li-Na Wang, Jun Liu, Xin Sun
Finally, given a set of semantic descriptions, the diverse properties of the samples in the semantic space can lead the framework to find an appropriate generation model that uses appropriate parameters to produce a desired texture.
no code implementations • 25 Nov 2016 • Guoqiang Zhong, Li-Na Wang, Junyu Dong
Since about 100 years ago, to learn the intrinsic structure of data, many representation learning approaches have been proposed, including both linear ones and nonlinear ones, supervised ones and unsupervised ones.