no code implementations • ECCV 2020 • Lu Zhou, Yingying Chen, Yunze Gao, Jinqiao Wang, Hanqing Lu
To overcome the defects caused by the erasing operation, we perform feature reconstruction to recover the information destroyed by occlusion and details lost in cleaning procedure.
no code implementations • ECCV 2020 • Xiaomei Zhang, Yingying Chen, Bingke Zhu, Jinqiao Wang, Ming Tang
Although human parsing has made great progress, it still faces a challenge, i. e., how to extract the whole foreground from similar or cluttered scenes effectively.
no code implementations • 21 Apr 2024 • Zhaopeng Gu, Bingke Zhu, Guibo Zhu, Yingying Chen, Hao Li, Ming Tang, Jinqiao Wang
Zero-shot anomaly detection (ZSAD) methods entail detecting anomalies directly without access to any known normal or abnormal samples within the target item categories.
1 code implementation • 16 Apr 2024 • Enming Zhang, Bingke Zhu, Yingying Chen, Qinghai Miao, Ming Tang, Jinqiao Wang
This limitation restricts the capabilities of pretrained VLMs and can result in incorrect predictions in downstream tasks.
no code implementations • 5 Feb 2024 • Yang Sui, Huy Phan, Jinqi Xiao, Tianfang Zhang, Zijie Tang, Cong Shi, Yan Wang, Yingying Chen, Bo Yuan
In this paper, for the first time, we systematically explore the detectability of the poisoned noise input for the backdoored diffusion models, an important performance metric yet little explored in the existing works.
no code implementations • 11 Oct 2023 • Chen Chen, Junqing Zhang, Yingying Chen
Physical layer key generation based on reciprocal and random wireless channels has been an attractive solution for securing resource-constrained low-power wide-area networks (LPWANs).
1 code implementation • 29 Aug 2023 • Zhaopeng Gu, Bingke Zhu, Guibo Zhu, Yingying Chen, Ming Tang, Jinqiao Wang
Large Vision-Language Models (LVLMs) such as MiniGPT-4 and LLaVA have demonstrated the capability of understanding images and achieved remarkable performance in various visual tasks.
1 code implementation • ICCV 2023 • Qiufan Ji, Lin Wang, Cong Shi, Shengshan Hu, Yingying Chen, Lichao Sun
In this paper, we first establish a comprehensive, and rigorous point cloud adversarial robustness benchmark to evaluate adversarial robustness, which can provide a detailed understanding of the effects of the defense and attack methods.
no code implementations • 10 Nov 2022 • Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren
In this paper, we propose a voice de-identification system, which uses adversarial examples to balance the privacy and utility of voice services.
1 code implementation • 20 Sep 2022 • Haofeng Li, Junjia Huang, Guanbin Li, Zhou Liu, Yihong Zhong, Yingying Chen, Yunfei Wang, Xiang Wan
Deep neural networks (DNNs) have been widely adopted in brain lesion detection and segmentation.
1 code implementation • 22 Aug 2022 • Huy Phan, Cong Shi, Yi Xie, Tianfang Zhang, Zhuohang Li, Tianming Zhao, Jian Liu, Yan Wang, Yingying Chen, Bo Yuan
Recently backdoor attack has become an emerging threat to the security of deep neural network (DNN) models.
no code implementations • CVPR 2022 • Zhaowen Li, Yousong Zhu, Fan Yang, Wei Li, Chaoyang Zhao, Yingying Chen, Zhiyang Chen, Jiahao Xie, Liwei Wu, Rui Zhao, Ming Tang, Jinqiao Wang
Furthermore, our method can also exploit single-centric-object dataset such as ImageNet and outperforms BYOL by 2. 5% with the same pre-training epochs in linear probing, and surpass current self-supervised object detection methods on COCO dataset, demonstrating its universality and potential.
no code implementations • 3 Mar 2022 • Guolin Yin, Junqing Zhang, Guanxiong Shen, Yingying Chen
When the system was applied in the target domain, few samples were used to fine-tune the feature extractor for domain adaptation.
no code implementations • CVPR 2022 • Tong Wang, Yousong Zhu, Yingying Chen, Chaoyang Zhao, Bin Yu, Jinqiao Wang, Ming Tang
The decision boundary between any two categories is the angular bisector of their weight vectors.
no code implementations • 15 Oct 2021 • Zhaoyi Xu, Cong Shi, Tianfang Zhang, ShuPing Li, Yichao Yuan, Chung-Tse Michael Wu, Yingying Chen, Athina Petropulu
Based on the designed TDM phased-MIMO radar, we develop a system to automatically localize multiple human subjects and estimate their vital signs.
no code implementations • CVPR 2021 • Linyu Zheng, Ming Tang, Yingying Chen, Guibo Zhu, Jinqiao Wang, Hanqing Lu
Despite considerable similarities between multiple object tracking (MOT) and single object tracking (SOT) tasks, modern MOT methods have not benefited from the development of SOT ones to achieve satisfactory performance.
no code implementations • 26 Apr 2020 • Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan
These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).
no code implementations • 4 Mar 2020 • Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan
As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.
1 code implementation • 12 Jul 2019 • S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen
In this paper, we build a speech privacy attack that exploits speech reverberations generated from a smartphone's inbuilt loudspeaker captured via a zero-permission motion sensor (accelerometer).
Cryptography and Security
no code implementations • ECCV 2020 • Linyu Zheng, Ming Tang, Yingying Chen, Jinqiao Wang, Hanqing Lu
After observing that the features used in most online discriminatively trained trackers are not optimal, in this paper, we propose a novel and effective architecture to learn optimal feature embeddings for online discriminative tracking.
no code implementations • 18 Dec 2018 • Yunze Gao, Yingying Chen, Jinqiao Wang, Zhen Lei, Xiao-Yu Zhang, Hanqing Lu
In this paper, we propose a novel Recurrent Calibration Network (RCN) for irregular scene text recognition.
4 code implementations • CVPR 2020 • Fisher Yu, Haofeng Chen, Xin Wang, Wenqi Xian, Yingying Chen, Fangchen Liu, Vashisht Madhavan, Trevor Darrell
Datasets drive vision progress, yet existing driving datasets are impoverished in terms of visual content and supported tasks to study multitask learning for autonomous driving.
Ranked #5 on Multiple Object Tracking on BDD100K test
no code implementations • 13 Sep 2017 • Yunze Gao, Yingying Chen, Jinqiao Wang, Hanqing Lu
Reading text in the wild is a challenging task in the field of computer vision.
1 code implementation • 26 Jul 2017 • Bingke Zhu, Yingying Chen, Jinqiao Wang, Si Liu, Bo Zhang, Ming Tang
Finally, an automatic portrait animation system based on fast deep matting is built on mobile devices, which does not need any interaction and can realize real-time matting with 15 fps.
no code implementations • 24 Jul 2017 • Xu Zhao, Yingying Chen, Ming Tang, Jinqiao Wang
In the first stage, a convolutional encoder-decoder sub-network is employed to reconstruct the background images and encode rich prior knowledge of background scenes.