no code implementations • 3 Nov 2023 • Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen
In this paper, we propose a novel universal perturbation-based secret key-controlled data-hiding method, realizing data hiding with a single universal perturbation and data decoding with the secret key-controlled decoder.
1 code implementation • 1 Nov 2023 • Jiakai Wang, Donghua Wang, Jin Hu, Siyang Wu, Tingsong Jiang, Wen Yao, Aishan Liu, Xianglong Liu
However, current research on physical adversarial examples (PAEs) lacks a comprehensive understanding of their unique characteristics, leading to limited significance and understanding.
1 code implementation • ICCV 2023 • Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen
In this paper, we propose a novel Reflected Light Attack (RFLA), featuring effective and stealthy in both the digital and physical world, which is implemented by placing the color transparent plastic sheet and a paper cut of a specific shape in front of the mirror to create different colored geometries on the target object.
no code implementations • 13 Jul 2023 • Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen
To bridge the gap between AutoML and semantic adversarial attacks, we propose a novel method called multi-objective evolutionary search of variable-length composite semantic perturbations (MES-VCSP).
no code implementations • 3 Jun 2023 • Tingsong Jiang, Andy Zeng
We apply sentiment analysis in financial context using FinBERT, and build a deep neural network model based on LSTM to predict the movement of financial market movement.
no code implementations • 12 May 2023 • Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen
Finally, we propose a multi-fidelity online surrogate during optimization to further decrease the search cost.
no code implementations • 21 Apr 2023 • Chengyin Hu, Weiwen Shi, Tingsong Jiang, Wen Yao, Ling Tian, Xiaoqian Chen
Infrared imaging systems have a vast array of potential applications in pedestrian detection and autonomous driving, and their safety performance is of great concern.
no code implementations • 20 Apr 2023 • Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen
Then, we extract the copyright information from the encoded copyrighted image with the devised copyright decoder.
no code implementations • 17 Oct 2022 • Jialiang Sun, Tingsong Jiang, Wen Yao, Donghua Wang, Xiaoqian Chen
In the first stage, we optimize the global texture to minimize the discrepancy between the rendered object and the scene images, making human eyes difficult to distinguish.
no code implementations • 28 Sep 2022 • Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen
Then, we discuss the existing physical attacks and focus on the technique for improving the robustness of physical attacks under complex physical environmental conditions.
no code implementations • 15 Aug 2022 • Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen
Therefore, we propose a multi-objective memetic algorithm for auto adversarial attack optimization design, which realizes the automatical search for the near-optimal adversarial attack towards defensed models.
no code implementations • 7 Mar 2022 • Jialiang Sun, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen
To alleviate these problems, in this paper, we first propose a novel platform called auto adversarial attack and defense ($A^{3}D$), which can help search for robust neural network architectures and efficient adversarial attacks.
1 code implementation • 14 Feb 2022 • Xiaohu Zheng, Wen Yao, Zhiqiang Gong, Yunyang Zhang, Xiaoyu Zhao, Tingsong Jiang
However, a lot of labeled data is needed to train CNN, and the common CNN can not quantify the aleatoric uncertainty caused by data noise.
1 code implementation • 15 Sep 2021 • Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Xiaoya Zhang, Zhiqiang Gong, Wen Yao, Xiaoqian Chen
To bridge the gap between digital attacks and physical attacks, we exploit the full 3D vehicle surface to propose a robust Full-coverage Camouflage Attack (FCA) to fool detectors.
no code implementations • 15 Jul 2021 • Yufeng Xia, Jun Zhang, Zhiqiang Gong, Tingsong Jiang, Wen Yao
Deep Ensemble is widely considered the state-of-the-art method which can estimate the uncertainty with higher quality, but it is very expensive to train and test.
no code implementations • COLING 2016 • Tingsong Jiang, Tianyu Liu, Tao Ge, Lei Sha, Baobao Chang, Sujian Li, Zhifang Sui
In this paper, we present a novel time-aware knowledge graph completion model that is able to predict links in a KG using both the existing facts and the temporal information of the facts.