Search Results for author: Weixuan Tang

Found 9 papers, 5 papers with code

Black-box Adversarial Attacks Against Image Quality Assessment Models

no code implementations27 Feb 2024 Yu Ran, Ao-Xiang Zhang, Mingjie Li, Weixuan Tang, Yuan-Gen Wang

Specifically, we first formulate the attack problem as maximizing the deviation between the estimated quality scores of original and perturbed images, while restricting the perturbed image distortions for visual quality preservation.

No-Reference Image Quality Assessment NR-IQA

Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks

1 code implementation NeurIPS 2023 Ao-Xiang Zhang, Yu Ran, Weixuan Tang, Yuan-Gen Wang

In this paper, we make the first attempt to evaluate the robustness of NR-VQA models against adversarial attacks, and propose a patch-based random search method for black-box attack.

Video Quality Assessment Visual Question Answering (VQA)

HVS Revisited: A Comprehensive Video Quality Assessment Framework

no code implementations9 Oct 2022 Ao-Xiang Zhang, Yuan-Gen Wang, Weixuan Tang, Leida Li, Sam Kwong

Based on the revisited HVS, a no-reference VQA framework called HVS-5M (NRVQA framework with five modules simulating HVS with five characteristics) is proposed.

Video Quality Assessment Visual Question Answering (VQA)

Multi-instance Point Cloud Registration by Efficient Correspondence Clustering

1 code implementation CVPR 2022 Weixuan Tang, Danping Zou

We address the problem of estimating the poses of multiple instances of the source point cloud within a target point cloud.

Clustering Point Cloud Registration

Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge

no code implementations9 May 2021 Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang

To address the issue, in this paper we extend an existing automatic cost learning scheme to JPEG, where the proposed scheme called JEC-RL (JPEG Embedding Cost with Reinforcement Learning) is explicitly designed to tailor the JPEG DCT structure.

reinforcement-learning Reinforcement Learning (RL)

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image

no code implementations13 Jan 2021 Xinghong Qin, Shunquan Tan, Bin Li, Weixuan Tang, Jiwu Huang

In this paper, we present a novel steganography scheme denoted as ITE-SYN (based on ITEratively adversarial perturbations onto a SYNchronized-directions sub-image), by which security data is embedded with synchronizing modification directions to enhance security and then iteratively increased perturbations are added onto a sub-image to reduce loss with cover class label of the target CNN classifier.

Image Steganography Steganalysis

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning

1 code implementation journal 2020 Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang

In SPAR-RL, an agent utilizes a policy network which decomposes the embedding process into pixel-wise actions and aims at maximizing the total rewards from a simulated steganalytic environment, while the environment employs an environment network for pixel-wise reward assignment.

Image Steganography reinforcement-learning

Cannot find the paper you are looking for? You can Submit a new open access paper.