Search Results for author: Tingsong Jiang

Found 22 papers, 4 papers with code

Universal Perturbation-based Secret Key-Controlled Data Hiding

no code implementations3 Nov 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen

In this paper, we propose a novel universal perturbation-based secret key-controlled data-hiding method, realizing data hiding with a single universal perturbation and data decoding with the secret key-controlled decoder.

Adversarial Examples in the Physical World: A Survey

1 code implementation1 Nov 2023 Jiakai Wang, Donghua Wang, Jin Hu, Siyang Wu, Tingsong Jiang, Wen Yao, Aishan Liu, Xianglong Liu

However, current research on physical adversarial examples (PAEs) lacks a comprehensive understanding of their unique characteristics, leading to limited significance and understanding.

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World

1 code implementation ICCV 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen

In this paper, we propose a novel Reflected Light Attack (RFLA), featuring effective and stealthy in both the digital and physical world, which is implemented by placing the color transparent plastic sheet and a paper cut of a specific shape in front of the mirror to create different colored geometries on the target object.

Adversarial Attack Object

Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations

no code implementations13 Jul 2023 Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

To bridge the gap between AutoML and semantic adversarial attacks, we propose a novel method called multi-objective evolutionary search of variable-length composite semantic perturbations (MES-VCSP).

Adversarial Attack AutoML

Financial sentiment analysis using FinBERT with application in predicting stock movement

no code implementations3 Jun 2023 Tingsong Jiang, Andy Zeng

We apply sentiment analysis in financial context using FinBERT, and build a deep neural network model based on LSTM to predict the movement of financial market movement.

Sentiment Analysis

Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation

no code implementations12 May 2023 Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Finally, we propose a multi-fidelity online surrogate during optimization to further decrease the search cost.

Neural Architecture Search

Adversarial Infrared Blocks: A Multi-view Black-box Attack to Thermal Infrared Detectors in Physical World

no code implementations21 Apr 2023 Chengyin Hu, Weiwen Shi, Tingsong Jiang, Wen Yao, Ling Tian, Xiaoqian Chen

Infrared imaging systems have a vast array of potential applications in pedestrian detection and autonomous driving, and their safety performance is of great concern.

Autonomous Driving Pedestrian Detection

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications

no code implementations20 Apr 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen

Then, we extract the copyright information from the encoded copyrighted image with the devised copyright decoder.

Style Transfer

Differential Evolution based Dual Adversarial Camouflage: Fooling Human Eyes and Object Detectors

no code implementations17 Oct 2022 Jialiang Sun, Tingsong Jiang, Wen Yao, Donghua Wang, Xiaoqian Chen

In the first stage, we optimize the global texture to minimize the discrepancy between the rendered object and the scene images, making human eyes difficult to distinguish.

Object

A Survey on Physical Adversarial Attack in Computer Vision

no code implementations28 Sep 2022 Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen

Then, we discuss the existing physical attacks and focus on the technique for improving the robustness of physical attacks under complex physical environmental conditions.

Adversarial Attack object-detection +2

A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design

no code implementations15 Aug 2022 Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Therefore, we propose a multi-objective memetic algorithm for auto adversarial attack optimization design, which realizes the automatical search for the near-optimal adversarial attack towards defensed models.

Adversarial Attack Adversarial Defense

$A^{3}D$: A Platform of Searching for Robust Neural Architectures and Efficient Adversarial Attacks

no code implementations7 Mar 2022 Jialiang Sun, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen

To alleviate these problems, in this paper, we first propose a novel platform called auto adversarial attack and defense ($A^{3}D$), which can help search for robust neural network architectures and efficient adversarial attacks.

Adversarial Attack Adversarial Defense +1

Deep Monte Carlo Quantile Regression for Quantifying Aleatoric Uncertainty in Physics-informed Temperature Field Reconstruction

1 code implementation14 Feb 2022 Xiaohu Zheng, Wen Yao, Zhiqiang Gong, Yunyang Zhang, Xiaoyu Zhao, Tingsong Jiang

However, a lot of labeled data is needed to train CNN, and the common CNN can not quantify the aleatoric uncertainty caused by data noise.

regression

FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack

1 code implementation15 Sep 2021 Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Xiaoya Zhang, Zhiqiang Gong, Wen Yao, Xiaoqian Chen

To bridge the gap between digital attacks and physical attacks, we exploit the full 3D vehicle surface to propose a robust Full-coverage Camouflage Attack (FCA) to fool detectors.

Adversarial Attack object-detection +1

RBUE: A ReLU-Based Uncertainty Estimation Method of Deep Neural Networks

no code implementations15 Jul 2021 Yufeng Xia, Jun Zhang, Zhiqiang Gong, Tingsong Jiang, Wen Yao

Deep Ensemble is widely considered the state-of-the-art method which can estimate the uncertainty with higher quality, but it is very expensive to train and test.

Towards Time-Aware Knowledge Graph Completion

no code implementations COLING 2016 Tingsong Jiang, Tianyu Liu, Tao Ge, Lei Sha, Baobao Chang, Sujian Li, Zhifang Sui

In this paper, we present a novel time-aware knowledge graph completion model that is able to predict links in a KG using both the existing facts and the temporal information of the facts.

Question Answering Relation Extraction +1

Cannot find the paper you are looking for? You can Submit a new open access paper.