Search Results for author: Yushu Zhang

Found 19 papers, 6 papers with code

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

1 code implementation23 Feb 2024 Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Xiaochun Cao, Jian Weng

Developing robust and interpretable vision systems is a crucial step towards trustworthy artificial intelligence.

Neural Architecture Search

Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models

no code implementations15 Oct 2023 Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu

In this review, we attempt to clearly elaborate on the connotation, attributes, and requirements of active DNN copyright protection, provide evaluation methods and metrics for active copyright protection, review and analyze existing work on active DL model intellectual property protection, discuss potential attacks that active DL model copyright protection techniques may face, and provide challenges and future directions for active DL model intellectual property protection.

Management

Towards an Accurate and Secure Detector against Adversarial Perturbations

1 code implementation18 May 2023 Chao Wang, Shuren Qi, Zhiqiu Huang, Yushu Zhang, Rushi Lan, Xiaochun Cao

It expands the above works on two aspects: 1) the introduced Krawtchouk basis provides better spatial-frequency discriminability and thereby is more suitable for capturing adversarial patterns than the common trigonometric or wavelet basis; 2) the extensive parameters for decomposition are generated by a pseudo-random function with secret keys, hence blocking the defense-aware adversarial attack.

Adversarial Attack Blocking

Representing Noisy Image Without Denoising

1 code implementation18 Jan 2023 Shuren Qi, Yushu Zhang, Chao Wang, Tao Xiang, Xiaochun Cao, Yong Xiang

In this paper, we explore a non-learning paradigm that aims to derive robust representation directly from noisy images, without the denoising as pre-processing.

Data Augmentation Image Denoising

InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features

no code implementations14 Oct 2022 Mingfu Xue, Xin Wang, Yinghao Wu, Shifeng Ni, Yushu Zhang, Weiqiang Liu

Since the intrinsic feature is composed of unique interpretation of the model's decision, the intrinsic feature can be regarded as fingerprint of the model.

Explainable artificial intelligence

Uformer-ICS: A Specialized U-Shaped Transformer for Image Compressive Sensing

no code implementations5 Sep 2022 Kuiyuan Zhang, Zhongyun Hua, Yuanman Li, Yushu Zhang, Yicong Zhou

We develop a projection-based transformer block by integrating the prior projection knowledge of CS into the original transformer blocks, and then build a symmetrical reconstruction model using the projection-based transformer blocks and residual convolutional blocks.

Compressive Sensing

Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection

1 code implementation19 Jul 2022 Chao Wang, Zhiqiu Huang, Shuren Qi, Yaoshen Yu, Guohua Shen, Yushu Zhang

In this paper, we present a very first study of trying to mitigate the semantic gap problem in copy-move forgery detection, with spatial pooling of local moment invariants for midlevel image representation.

Detecting Recolored Image by Spatial Correlation

no code implementations23 Apr 2022 Yushu Zhang, Nuo Chen, Shuren Qi, Mingfu Xue, Xiaochun Cao

In this paper, we try to explore a solution from the perspective of the spatial correlation, which exhibits the generic detection capability for both conventional and deep learning-based recoloring.

Image Forensics Image Manipulation

A Principled Design of Image Representation: Towards Forensic Tasks

1 code implementation2 Mar 2022 Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao

Image forensics is a rising topic as the trustworthy multimedia content is critical for modern society.

Image Forensics

Detect and remove watermark in deep neural networks via generative adversarial networks

no code implementations15 Jun 2021 Haoqi Wang, Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu

Experimental evaluations on the MNIST and CIFAR10 datasets demonstrate that, the proposed method can effectively remove about 98% of the watermark in DNN models, as the watermark retention rate reduces from 100% to less than 2% after applying the proposed attack.

Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations

no code implementations29 May 2021 Mingfu Xue, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu

Experimental results show that, the backdoor detection rate of the proposed defense method is 99. 63%, 99. 76% and 99. 91% on Fashion-MNIST, CIFAR-10 and GTSRB datasets, respectively.

Backdoor Attack

AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption

no code implementations28 May 2021 Mingfu Xue, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu

Moreover, the proposed method only needs to encrypt an extremely low number of parameters, and the proportion of the encrypted parameters of all the model's parameters is as low as 0. 000205%.

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples

no code implementations2 Mar 2021 Mingfu Xue, Shichang Sun, Can He, Yushu Zhang, Jian Wang, Weiqiang Liu

For ownership verification, the embedded watermark can be successfully extracted, while the normal performance of the DNN model will not be affected.

Management

A multi-level approach with visual information for encrypted H.265/HEVC videos

no code implementations5 Nov 2020 Wenying Wen, Rongxin Tu, Yushu Zhang, Yuming Fang, Yong Yang

High-efficiency video coding (HEVC) encryption has been proposed to encrypt syntax elements for the purpose of video encryption.

Indoor image representation by high-level semantic features

no code implementations12 Jun 2019 Chiranjibi Sitaula, Yong Xiang, Yushu Zhang, Xuequan Lu, Sunil Aryal

Nevertheless, most of the existing feature extraction methods, which extract features based on pixels, color, shape/object parts or objects on images, suffer from limited capabilities in describing semantic information (e. g., object association).

General Classification Image Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.