Search Results for author: Xian Zhao

Found 8 papers, 2 papers with code

Clusterformer: Cluster-based Transformer for 3D Object Detection in Point Clouds

no code implementations ICCV 2023 Yu Pei, Xian Zhao, Hao Li, Jingyuan Ma, Jingwei Zhang, ShiLiang Pu

Attributed to the unstructured and sparse nature of point clouds, the transformer shows greater potential in point clouds data processing.

3D Object Detection Object +1

Benign Adversarial Attack: Tricking Models for Goodness

no code implementations26 Jul 2021 Jitao Sang, Xian Zhao, Jiaming Zhang, Zhiyu Lin

In spite of the successful application in many fields, machine learning models today suffer from notorious problems like vulnerability to adversarial examples.

Adversarial Attack Attribute +2

RangeIoUDet: Range Image Based Real-Time 3D Object Detector Optimized by Intersection Over Union

no code implementations CVPR 2021 Zhidong Liang, Zehan Zhang, Ming Zhang, Xian Zhao, ShiLiang Pu

Benefiting from the dense representation of the range image, RangeIoUDet is entirely constructed based on 2D convolution, making it possible to have a fast inference speed.

3D Object Detection Autonomous Driving +2

An Experimental Study of Semantic Continuity for Deep Learning Models

no code implementations19 Nov 2020 Shangxi Wu, Jitao Sang, Xian Zhao, Lizhang Chen

Deep learning models suffer from the problem of semantic discontinuity: small perturbations in the input space tend to cause semantic-level interference to the model output.

Adversarial Robustness

MAFF-Net: Filter False Positive for 3D Vehicle Detection with Multi-modal Adaptive Feature Fusion

no code implementations23 Sep 2020 Zehan Zhang, Ming Zhang, Zhidong Liang, Xian Zhao, Ming Yang, Wenming Tan, ShiLiang Pu

Experimental results on the KITTI dataset demonstrate significant improvement in filtering false positive over the approach using only point cloud data.

Autonomous Driving

Adversarial Privacy-preserving Filter

2 code implementations25 Jul 2020 Jiaming Zhang, Jitao Sang, Xian Zhao, Xiaowen Huang, Yanfeng Sun, Yongli Hu

While widely adopted in practical applications, face recognition has been critically discussed regarding the malicious use of face images and the potential privacy problems, e. g., deceiving payment system and causing personal sabotage.

Adversarial Attack Face Recognition +1

Cannot find the paper you are looking for? You can Submit a new open access paper.