Search Results for author: Qilin Zhang

Found 12 papers, 4 papers with code

Adversarial Attack and Defense in Deep Ranking

1 code implementation7 Jun 2021 Mo Zhou, Le Wang, Zhenxing Niu, Qilin Zhang, Nanning Zheng, Gang Hua

In this paper, we propose two attacks against deep ranking systems, i. e., Candidate Attack and Query Attack, that can raise or lower the rank of chosen candidates by adversarial perturbations.

Adversarial Attack Adversarial Robustness

Practical Relative Order Attack in Deep Ranking

2 code implementations ICCV 2021 Mo Zhou, Le Wang, Zhenxing Niu, Qilin Zhang, Yinghui Xu, Nanning Zheng, Gang Hua

In this paper, we formulate a new adversarial attack against deep ranking systems, i. e., the Order Attack, which covertly alters the relative order among a selected set of candidates according to an attacker-specified permutation, with limited interference to other unrelated candidates.

Adversarial Attack

Practical Order Attack in Deep Ranking

no code implementations1 Jan 2021 Mo Zhou, Le Wang, Zhenxing Niu, Qilin Zhang, Xu Yinghui, Nanning Zheng, Gang Hua

The objective of this paper is to formalize and practically implement a new adversarial attack against deep ranking systems, i. e., the Order Attack, which covertly alters the relative order of a selected set of candidates according to a permutation vector predefined by the attacker, with only limited interference to other unrelated candidates.

Adversarial Attack Image Retrieval

Adversarial Ranking Attack and Defense

3 code implementations ECCV 2020 Mo Zhou, Zhenxing Niu, Le Wang, Qilin Zhang, Gang Hua

In this paper, we propose two attacks against deep ranking systems, i. e., Candidate Attack and Query Attack, that can raise or lower the rank of chosen candidates by adversarial perturbations.

Adversarial Attack Image Retrieval

Ladder Loss for Coherent Visual-Semantic Embedding

2 code implementations18 Nov 2019 Mo Zhou, Zhenxing Niu, Le Wang, Zhanning Gao, Qilin Zhang, Gang Hua

For visual-semantic embedding, the existing methods normally treat the relevance between queries and candidates in a bipolar way -- relevant or irrelevant, and all "irrelevant" candidates are uniformly pushed away from the query by an equal margin in the embedding space, regardless of their various proximity to the query.

Retrieval

Bimodal Stereo: Joint Shape and Pose Estimation from Color-Depth Image Pair

no code implementations16 May 2019 Chi Zhang, Yuehu Liu, Ying Wu, Qilin Zhang, Le Wang

In the pipeline, the estimated shape is refined by the shape prior from the given depth map under the estimated pose.

Pose Estimation

Visual Attribute-augmented Three-dimensional Convolutional Neural Network for Enhanced Human Action Recognition

no code implementations8 May 2018 Yunfeng Wang, Wengang Zhou, Qilin Zhang, Houqiang Li

Visual attributes in individual video frames, such as the presence of characteristic objects and scenes, offer substantial information for action recognition in videos.

Action Recognition In Videos Attribute +4

Low-Latency Human Action Recognition with Weighted Multi-Region Convolutional Neural Network

no code implementations8 May 2018 Yunfeng Wang, Wengang Zhou, Qilin Zhang, Xiaotian Zhu, Houqiang Li

Termed "Weighted Multi-Region Convolutional Neural Network" (WMR ConvNet), the proposed system is LSTM-free, and is based on 2D ConvNet that does not require the accumulation of video frames for 3D ConvNet filtering.

Action Recognition Chunking +2

Attention-based Temporal Weighted Convolutional Neural Network for Action Recognition

no code implementations19 Mar 2018 Jinliang Zang, Le Wang, Ziyi Liu, Qilin Zhang, Zhenxing Niu, Gang Hua, Nanning Zheng

Research in human action recognition has accelerated significantly since the introduction of powerful machine learning tools such as Convolutional Neural Networks (CNNs).

Action Recognition Temporal Action Localization

Video-based Sign Language Recognition without Temporal Segmentation

no code implementations30 Jan 2018 Jie Huang, Wengang Zhou, Qilin Zhang, Houqiang Li, Weiping Li

Worse still, isolated SLR methods typically require strenuous labeling of each word separately in a sentence, severely limiting the amount of attainable training data.

Segmentation Sentence +1

Cannot find the paper you are looking for? You can Submit a new open access paper.