Search Results for author: Yuan Xiao

Found 6 papers, 2 papers with code

Certifying Robustness of Convolutional Neural Networks with Tight Linear Approximation

1 code implementation13 Nov 2022 Yuan Xiao, Tongtong Bai, Mingzheng Gu, Chunrong Fang, Zhenyu Chen

The robustness of neural network classifiers is becoming important in the safety-critical domain and can be quantified by robustness verification.

Partly Supervised Multitask Learning

no code implementations5 May 2020 Abdullah-Al-Zubaer Imran, Chao Huang, Hui Tang, Wei Fan, Yuan Xiao, Dingjun Hao, Zhen Qian, Demetri Terzopoulos

Leveraging self-supervision and adversarial training, we propose a novel general purpose semi-supervised, multiple-task model---namely, self-supervised, semi-supervised, multitask learning (S$^4$MTL)---for accomplishing two important tasks in medical imaging, segmentation and diagnostic classification.

Medical Image Segmentation Segmentation

Enhanced Seismic Imaging with Predictive Neural Networks for Geophysics

no code implementations11 Aug 2019 Ping Lu, Yanyan Zhang, Jianxiong Chen, Yuan Xiao, George Zhao

In addition, in each iteration step, the probability cubes of salt bodies and inclusions inferred from the proposed networks can be used as a regularization term within the FWI forward modelling, which may result in an improved velocity model estimation while the output of seismic migration can be utilized as an input of the 3D neural network for subsequent iterations.

Geophysics Seismic Imaging

Unsupervised Learning Framework of Interest Point Via Properties Optimization

1 code implementation26 Jul 2019 Pei Yan, Yihua Tan, Yuan Xiao, Yuan Tai, Cai Wen

To maximize the objective efficiently, latent variable is introduced to represent the probability of that a point satisfies the required properties.

SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution

no code implementations25 Feb 2018 Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai

Particularly, we show that when branch prediction of the enclave code can be influenced by programs outside the enclave, the control flow of the enclave program can be temporarily altered to execute instructions that lead to observable cache-state changes.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.