Search Results for author: Xiaoqian Chen

Found 22 papers, 8 papers with code

Universal Perturbation-based Secret Key-Controlled Data Hiding

no code implementations3 Nov 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen

In this paper, we propose a novel universal perturbation-based secret key-controlled data-hiding method, realizing data hiding with a single universal perturbation and data decoding with the secret key-controlled decoder.

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World

1 code implementation ICCV 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen

In this paper, we propose a novel Reflected Light Attack (RFLA), featuring effective and stealthy in both the digital and physical world, which is implemented by placing the color transparent plastic sheet and a paper cut of a specific shape in front of the mirror to create different colored geometries on the target object.

Adversarial Attack Object

Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations

no code implementations13 Jul 2023 Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

To bridge the gap between AutoML and semantic adversarial attacks, we propose a novel method called multi-objective evolutionary search of variable-length composite semantic perturbations (MES-VCSP).

Adversarial Attack AutoML

Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation

no code implementations12 May 2023 Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Finally, we propose a multi-fidelity online surrogate during optimization to further decrease the search cost.

Neural Architecture Search

Adversarial Infrared Blocks: A Multi-view Black-box Attack to Thermal Infrared Detectors in Physical World

no code implementations21 Apr 2023 Chengyin Hu, Weiwen Shi, Tingsong Jiang, Wen Yao, Ling Tian, Xiaoqian Chen

Infrared imaging systems have a vast array of potential applications in pedestrian detection and autonomous driving, and their safety performance is of great concern.

Autonomous Driving Pedestrian Detection

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications

no code implementations20 Apr 2023 Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen

Then, we extract the copyright information from the encoded copyrighted image with the devised copyright decoder.

Style Transfer

RecFNO: a resolution-invariant flow and heat field reconstruction method from sparse observations via Fourier neural operator

1 code implementation20 Feb 2023 Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Weien Zhou, Wen Yao, Yunyang Zhang

The MLP embedding is propitious to more sparse input, while the others benefit from spatial information preservation and perform better with the increase of observation data.

Super-Resolution

Differential Evolution based Dual Adversarial Camouflage: Fooling Human Eyes and Object Detectors

no code implementations17 Oct 2022 Jialiang Sun, Tingsong Jiang, Wen Yao, Donghua Wang, Xiaoqian Chen

In the first stage, we optimize the global texture to minimize the discrepancy between the rendered object and the scene images, making human eyes difficult to distinguish.

Object

A Survey on Physical Adversarial Attack in Computer Vision

no code implementations28 Sep 2022 Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen

Then, we discuss the existing physical attacks and focus on the technique for improving the robustness of physical attacks under complex physical environmental conditions.

Adversarial Attack object-detection +2

A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design

no code implementations15 Aug 2022 Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Therefore, we propose a multi-objective memetic algorithm for auto adversarial attack optimization design, which realizes the automatical search for the near-optimal adversarial attack towards defensed models.

Adversarial Attack Adversarial Defense

Heat Source Layout Optimization Using Automatic Deep Learning Surrogate and Multimodal Neighborhood Search Algorithm

no code implementations16 May 2022 Jialiang Sun, Xiaohu Zheng, Wen Yao, Xiaoya Zhang, Weien Zhou, Xiaoqian Chen

In satellite layout design, heat source layout optimization (HSLO) is an effective technique to decrease the maximum temperature and improve the heat management of the whole system.

Layout Design Management +1

Algorithms for Bayesian network modeling and reliability inference of complex multistate systems: Part II-Dependent systems

no code implementations4 Apr 2022 Xiaohu Zheng, Wen Yao, Xiaoqian Chen

This Part II proposes a novel method for BN reliability modeling and analysis to apply the compression idea to the complex multistate dependent system.

Contrastive Enhancement Using Latent Prototype for Few-Shot Segmentation

1 code implementation8 Mar 2022 Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Wen Yao, Yunyang Zhang, Xiaohu Zheng

This paper proposes a contrastive enhancement approach using latent prototypes to leverage latent classes and raise the utilization of similarity information between prototype and query features.

Segmentation

$A^{3}D$: A Platform of Searching for Robust Neural Architectures and Efficient Adversarial Attacks

no code implementations7 Mar 2022 Jialiang Sun, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen

To alleviate these problems, in this paper, we first propose a novel platform called auto adversarial attack and defense ($A^{3}D$), which can help search for robust neural network architectures and efficient adversarial attacks.

Adversarial Attack Adversarial Defense +1

Predicting Shallow Water Dynamics using Echo-State Networks with Transfer Learning

no code implementations16 Dec 2021 Xiaoqian Chen, Balasubramanya T. Nadiga, Ilya Timofeyev

In this paper we demonstrate that reservoir computing can be used to learn the dynamics of the shallow-water equations.

Transfer Learning

Physics-informed Convolutional Neural Networks for Temperature Field Prediction of Heat Source Layout without Labeled Data

1 code implementation26 Sep 2021 Xiaoyu Zhao, Zhiqiang Gong, Yunyang Zhang, Wen Yao, Xiaoqian Chen

As the construction of data pairs in most engineering problems is time-consuming, data acquisition is becoming the predictive capability bottleneck of most deep surrogate models, which also exists in surrogate for thermal analysis and design.

FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack

1 code implementation15 Sep 2021 Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Xiaoya Zhang, Zhiqiang Gong, Wen Yao, Xiaoqian Chen

To bridge the gap between digital attacks and physical attacks, we exploit the full 3D vehicle surface to propose a robust Full-coverage Camouflage Attack (FCA) to fool detectors.

Adversarial Attack object-detection +1

IDRLnet: A Physics-Informed Neural Network Library

1 code implementation9 Jul 2021 Wei Peng, Jun Zhang, Weien Zhou, Xiaoyu Zhao, Wen Yao, Xiaoqian Chen

Physics Informed Neural Network (PINN) is a scientific computing framework used to solve both forward and inverse problems modeled by Partial Differential Equations (PDEs).

A Deep Neural Network Surrogate Modeling Benchmark for Temperature Field Prediction of Heat Source Layout

1 code implementation20 Mar 2021 Xianqi Chen, Xiaoyu Zhao, Zhiqiang Gong, Jun Zhang, Weien Zhou, Xiaoqian Chen, Wen Yao

Thermal issue is of great importance during layout design of heat source components in systems engineering, especially for high functional-density products.

Layout Design Model Selection +1

Edge Computing Assisted Autonomous Flight for UAV: Synergies between Vision and Communications

no code implementations10 Dec 2020 Quan Chen, Hai Zhu, Lei Yang, Xiaoqian Chen, Sofie Pollin, Evgenii Vinogradov

By proposing a framework of Edge Computing Assisted Autonomous Flight (ECAAF), we illustrate that vision and communications can interact with and assist each other with the aid of edge computing and offloading, and further speed up the UAV mission completion.

Edge-computing Trajectory Planning Networking and Internet Architecture Robotics Systems and Control Systems and Control

Cannot find the paper you are looking for? You can Submit a new open access paper.