Search Results for author: Yongwei Wang

Found 15 papers, 7 papers with code

Impart: An Imperceptible and Effective Label-Specific Backdoor Attack

no code implementations18 Mar 2024 Jingke Zhao, Zan Wang, Yongwei Wang, Lanjun Wang

Backdoor attacks have been shown to impose severe threats to real security-critical scenarios.

Backdoor Attack

HGAttack: Transferable Heterogeneous Graph Adversarial Attack

no code implementations18 Jan 2024 He Zhao, Zhiwei Zeng, Yongwei Wang, Deheng Ye, Chunyan Miao

Heterogeneous Graph Neural Networks (HGNNs) are increasingly recognized for their performance in areas like the web and e-commerce, where resilience against adversarial attacks is crucial.

Adversarial Attack

Turning Waste into Wealth: Leveraging Low-Quality Samples for Enhancing Continuous Conditional Generative Adversarial Networks

1 code implementation20 Aug 2023 Xin Ding, Yongwei Wang, Zuheng Xu

Although Negative Data Augmentation (NDA) effectively enhances unconditional and class-conditional GANs by introducing anomalies into real training images, guiding the GANs away from low-quality outputs, its impact on CcGANs is limited, as it fails to replicate negative samples that may occur during the CcGAN sampling.

Data Augmentation

Occlusion-Robust FAU Recognition by Mining Latent Space of Masked Autoencoders

no code implementations8 Dec 2022 Minyang Jiang, Yongwei Wang, Martin J. McKeown, Z. Jane Wang

Bypassing the occlusion reconstruction step, our model efficiently extracts FAU features of occluded faces by mining the latent space of a pretrained masked autoencoder.

Knowledge Distillation

DUET: A Tuning-Free Device-Cloud Collaborative Parameters Generation Framework for Efficient Device Model Generalization

1 code implementation12 Sep 2022 Zheqi Lv, Wenqiao Zhang, Shengyu Zhang, Kun Kuang, Feng Wang, Yongwei Wang, Zhengyu Chen, Tao Shen, Hongxia Yang, Beng Chin Ooi, Fei Wu

DUET is deployed on a powerful cloud server that only requires the low cost of forwarding propagation and low time delay of data transmission between the device and the cloud.

Device-Cloud Collaboration Domain Adaptation +3

Reversing Skin Cancer Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism

no code implementations22 Aug 2022 Yongwei Wang, Yuan Li, Zhiqi Shen, Yuhui Qiao

Crucially, to further reverse adversarial noises and suppress redundant injected noises, a novel multiscale denoising mechanism is carefully designed that aggregates image information from neighboring scales.

Denoising Skin Cancer Classification

SSD-KD: A Self-supervised Diverse Knowledge Distillation Method for Lightweight Skin Lesion Classification Using Dermoscopic Images

1 code implementation22 Mar 2022 Yongwei Wang, Yuheng Wang, Tim K. Lee, Chunyan Miao, Z. Jane Wang

In this case, knowledge distillation (KD) has been proven as an efficient tool to help improve the adaptability of lightweight models under limited resources, meanwhile keeping a high-level representation capability.

Knowledge Distillation Lesion Classification +1

Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework

no code implementations31 Jul 2021 Li Ding, Yongwei Wang, Xin Ding, Kaiwen Yuan, Ping Wang, Hua Huang, Z. Jane Wang

Deep learning based image classification models are shown vulnerable to adversarial attacks by injecting deliberately crafted noises to clean images.

Adversarial Defense Image Classification +1

Distilling and Transferring Knowledge via cGAN-generated Samples for Image Classification and Regression

2 code implementations7 Apr 2021 Xin Ding, Yongwei Wang, Zuheng Xu, Z. Jane Wang, William J. Welch

Knowledge distillation (KD) has been actively studied for image classification tasks in deep learning, aiming to improve the performance of a student based on the knowledge from a teacher.

General Classification Image Classification +2

Continuous Conditional Generative Adversarial Networks: Novel Empirical Losses and Label Input Mechanisms

1 code implementation ICLR 2021 Xin Ding, Yongwei Wang, Zuheng Xu, William J. Welch, Z. Jane Wang

This work proposes the continuous conditional generative adversarial network (CcGAN), the first generative model for image generation conditional on continuous, scalar conditions (termed regression labels).

Generative Adversarial Network Image Generation +1

Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection

1 code implementation29 Oct 2020 Yongwei Wang, Xin Ding, Li Ding, Rabab Ward, Z. Jane Wang

Specially, when adversaries consider imperceptibility as a constraint, the proposed anti-forensic method can improve the average attack success rate by around 30\% on fake face images over two baseline attacks.

Adversarial Attack Face Detection

A Deep Learning Based Attack for The Chaos-based Image Encryption

no code implementations29 Jul 2019 Chen He, Kan Ming, Yongwei Wang, Z. Jane Wang

In this letter, as a proof of concept, we propose a deep learning-based approach to attack the chaos-based image encryption algorithm in \cite{guan2005chaos}.

Cannot find the paper you are looking for? You can Submit a new open access paper.