no code implementations • 24 Apr 2024 • Xuxin Chen, Yuheng Li, Mingzhe Hu, Ella Salari, Xiaoqian Chen, Richard L. J. Qiu, Bin Zheng, Xiaofeng Yang
For framework evaluation, we assembled two datasets retrospectively.
no code implementations • 3 Nov 2023 • Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen
In this paper, we propose a novel universal perturbation-based secret key-controlled data-hiding method, realizing data hiding with a single universal perturbation and data decoding with the secret key-controlled decoder.
1 code implementation • ICCV 2023 • Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen
In this paper, we propose a novel Reflected Light Attack (RFLA), featuring effective and stealthy in both the digital and physical world, which is implemented by placing the color transparent plastic sheet and a paper cut of a specific shape in front of the mirror to create different colored geometries on the target object.
no code implementations • 13 Jul 2023 • Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen
To bridge the gap between AutoML and semantic adversarial attacks, we propose a novel method called multi-objective evolutionary search of variable-length composite semantic perturbations (MES-VCSP).
no code implementations • 12 May 2023 • Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen
Finally, we propose a multi-fidelity online surrogate during optimization to further decrease the search cost.
no code implementations • 21 Apr 2023 • Chengyin Hu, Weiwen Shi, Tingsong Jiang, Wen Yao, Ling Tian, Xiaoqian Chen
Infrared imaging systems have a vast array of potential applications in pedestrian detection and autonomous driving, and their safety performance is of great concern.
no code implementations • 20 Apr 2023 • Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen
Then, we extract the copyright information from the encoded copyrighted image with the devised copyright decoder.
1 code implementation • 20 Feb 2023 • Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Weien Zhou, Wen Yao, Yunyang Zhang
The MLP embedding is propitious to more sparse input, while the others benefit from spatial information preservation and perform better with the increase of observation data.
no code implementations • 17 Oct 2022 • Jialiang Sun, Tingsong Jiang, Wen Yao, Donghua Wang, Xiaoqian Chen
In the first stage, we optimize the global texture to minimize the discrepancy between the rendered object and the scene images, making human eyes difficult to distinguish.
no code implementations • 28 Sep 2022 • Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen
Then, we discuss the existing physical attacks and focus on the technique for improving the robustness of physical attacks under complex physical environmental conditions.
no code implementations • 15 Aug 2022 • Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen
Therefore, we propose a multi-objective memetic algorithm for auto adversarial attack optimization design, which realizes the automatical search for the near-optimal adversarial attack towards defensed models.
no code implementations • 16 May 2022 • Jialiang Sun, Xiaohu Zheng, Wen Yao, Xiaoya Zhang, Weien Zhou, Xiaoqian Chen
In satellite layout design, heat source layout optimization (HSLO) is an effective technique to decrease the maximum temperature and improve the heat management of the whole system.
no code implementations • 4 Apr 2022 • Xiaohu Zheng, Wen Yao, Xiaoqian Chen
This Part II proposes a novel method for BN reliability modeling and analysis to apply the compression idea to the complex multistate dependent system.
1 code implementation • 8 Mar 2022 • Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Wen Yao, Yunyang Zhang, Xiaohu Zheng
This paper proposes a contrastive enhancement approach using latent prototypes to leverage latent classes and raise the utilization of similarity information between prototype and query features.
no code implementations • 7 Mar 2022 • Jialiang Sun, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen
To alleviate these problems, in this paper, we first propose a novel platform called auto adversarial attack and defense ($A^{3}D$), which can help search for robust neural network architectures and efficient adversarial attacks.
no code implementations • 16 Dec 2021 • Xiaoqian Chen, Balasubramanya T. Nadiga, Ilya Timofeyev
In this paper we demonstrate that reservoir computing can be used to learn the dynamics of the shallow-water equations.
1 code implementation • 26 Sep 2021 • Xiaoyu Zhao, Zhiqiang Gong, Yunyang Zhang, Wen Yao, Xiaoqian Chen
As the construction of data pairs in most engineering problems is time-consuming, data acquisition is becoming the predictive capability bottleneck of most deep surrogate models, which also exists in surrogate for thermal analysis and design.
1 code implementation • 15 Sep 2021 • Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Xiaoya Zhang, Zhiqiang Gong, Wen Yao, Xiaoqian Chen
To bridge the gap between digital attacks and physical attacks, we exploit the full 3D vehicle surface to propose a robust Full-coverage Camouflage Attack (FCA) to fool detectors.
2 code implementations • 17 Aug 2021 • Xiaoqian Chen, Zhiqiang Gong, Xiaoyu Zhao, Weien Zhou, Wen Yao
To overcome this problem, this work develops a machine learning modelling benchmark for TFR-HSS task.
1 code implementation • 9 Jul 2021 • Wei Peng, Jun Zhang, Weien Zhou, Xiaoyu Zhao, Wen Yao, Xiaoqian Chen
Physics Informed Neural Network (PINN) is a scientific computing framework used to solve both forward and inverse problems modeled by Partial Differential Equations (PDEs).
1 code implementation • 20 Mar 2021 • Xianqi Chen, Xiaoyu Zhao, Zhiqiang Gong, Jun Zhang, Weien Zhou, Xiaoqian Chen, Wen Yao
Thermal issue is of great importance during layout design of heat source components in systems engineering, especially for high functional-density products.
no code implementations • 10 Dec 2020 • Quan Chen, Hai Zhu, Lei Yang, Xiaoqian Chen, Sofie Pollin, Evgenii Vinogradov
By proposing a framework of Edge Computing Assisted Autonomous Flight (ECAAF), we illustrate that vision and communications can interact with and assist each other with the aid of edge computing and offloading, and further speed up the UAV mission completion.
Edge-computing Trajectory Planning Networking and Internet Architecture Robotics Systems and Control Systems and Control