Search Results for author: Yuntao Liu

Found 6 papers, 1 papers with code

Select2Col: Leveraging Spatial-Temporal Importance of Semantic Information for Efficient Collaborative Perception

1 code implementation31 Jul 2023 Yuntao Liu, Qian Huang, Rongpeng Li, Xianfu Chen, Zhifeng Zhao, Shuyuan Zhao, Yongdong Zhu, Honggang Zhang

Collaborative perception by leveraging the shared semantic information plays a crucial role in overcoming the individual limitations of isolated agents.

DynaMarks: Defending Against Deep Learning Model Extraction Using Dynamic Watermarking

no code implementations27 Jul 2022 Abhishek Chakraborty, Daniel Xing, Yuntao Liu, Ankur Srivastava

The functionality of a deep learning (DL) model can be stolen via model extraction where an attacker obtains a surrogate model by utilizing the responses from a prediction API of the original model.

Model extraction

Robust and Attack Resilient Logic Locking with a High Application-Level Impact

no code implementations7 Jan 2021 Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava

(3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and have similar effectiveness.

Cryptography and Security Hardware Architecture Formal Languages and Automata Theory

Visual Confusion Label Tree For Image Classification

no code implementations5 Jun 2019 Yuntao Liu, Yong Dou, Ruochun Jin, Rongchun Li

In order to optimize models and meet the requirement mentioned above, we propose a method that replaces the fully-connected layers of convolution neural network models with a tree classifier.

Classification General Classification +1

Visual Tree Convolutional Neural Network in Image Classification

no code implementations4 Jun 2019 Yuntao Liu, Yong Dou, Ruochun Jin, Peng Qiao

In image classification, Convolutional Neural Network(CNN) models have achieved high performance with the rapid development in deep learning.

Classification General Classification +1

Neural Trojans

no code implementations3 Oct 2017 Yuntao Liu, Yang Xie, Ankur Srivastava

In many cases, it is more practical to use a neural network intellectual property (IP) that an IP vendor has already trained.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.