Search Results for author: Ziqiang Li

Found 23 papers, 8 papers with code

Infinite-ID: Identity-preserved Personalization via ID-semantics Decoupling Paradigm

no code implementations18 Mar 2024 Yi Wu, Ziqiang Li, Heliang Zheng, Chaoyue Wang, Bin Li

Drawing on recent advancements in diffusion models for text-to-image generation, identity-preserved personalization has made significant progress in accurately capturing specific identities with just a single reference image.

Text-to-Image Generation

Diffusion model for relational inference

no code implementations30 Jan 2024 Shuhan Zheng, Ziqiang Li, Kantaro Fujiwara, Gouhei Tanaka

Dynamical behaviors of complex interacting systems, including brain activities, financial price movements, and physical collective phenomena, are associated with underlying interactions between the system's components.

Imputation Time Series

Two-stream joint matching method based on contrastive learning for few-shot action recognition

no code implementations8 Jan 2024 Long Deng, Ziqiang Li, Bingxin Zhou, Zhongming Chen, Ao Li, Yongxin Ge

Although few-shot action recognition based on metric learning paradigm has achieved significant success, it fails to address the following issues: (1) inadequate action relation modeling and underutilization of multi-modal information; (2) challenges in handling video matching problems with different lengths and speeds, and video matching problems with misalignment of video sub-actions.

Contrastive Learning Few-Shot action recognition +2

Efficient Trigger Word Insertion

no code implementations23 Nov 2023 Yueqi Zeng, Ziqiang Li, Pengfei Xia, Lei Liu, Bin Li

With the boom in the natural language processing (NLP) field these years, backdoor attacks pose immense threats against deep neural network models.

text-classification Text Classification

Explore the Effect of Data Selection on Poison Efficiency in Backdoor Attacks

no code implementations15 Oct 2023 Ziqiang Li, Pengfei Xia, Hong Sun, Yueqi Zeng, Wei zhang, Bin Li

In this study, we focus on improving the poisoning efficiency of backdoor attacks from the sample selection perspective.

Audio Classification Image Classification +2

Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios

no code implementations14 Jun 2023 Hong Sun, Ziqiang Li, Pengfei Xia, Heng Li, Beihao Xia, Yi Wu, Bin Li

However, existing backdoor attack methods make unrealistic assumptions, assuming that all training data comes from a single source and that attackers have full access to the training data.

Backdoor Attack

Multimodal Feature Extraction and Fusion for Emotional Reaction Intensity Estimation and Expression Classification in Videos with Transformers

1 code implementation16 Mar 2023 Jia Li, Yin Chen, Xuesong Zhang, Jiantao Nie, Ziqiang Li, Yangchen Yu, Yan Zhang, Richang Hong, Meng Wang

In this paper, we present our advanced solutions to the two sub-challenges of Affective Behavior Analysis in the wild (ABAW) 2023: the Emotional Reaction Intensity (ERI) Estimation Challenge and Expression (Expr) Classification Challenge.

Classification

FakeCLR: Exploring Contrastive Learning for Solving Latent Discontinuity in Data-Efficient GANs

1 code implementation18 Jul 2022 Ziqiang Li, Chaoyue Wang, Heliang Zheng, Jing Zhang, Bin Li

Since data augmentation strategies have largely alleviated the training instability, how to further improve the generative performance of DE-GANs becomes a hotspot.

Contrastive Learning Data Augmentation

Forcing the Whole Video as Background: An Adversarial Learning Strategy for Weakly Temporal Action Localization

no code implementations14 Jul 2022 Ziqiang Li, Yongxin Ge, Jiaruo Yu, Zhongming Chen

With video-level labels, weakly supervised temporal action localization (WTAL) applies a localization-by-classification paradigm to detect and classify the action in untrimmed videos.

Classification Weakly-supervised Temporal Action Localization +1

Data-Efficient Backdoor Attacks

1 code implementation22 Apr 2022 Pengfei Xia, Ziqiang Li, Wei zhang, Bin Li

Recent studies have proven that deep neural networks are vulnerable to backdoor attacks.

A Comprehensive Survey on Data-Efficient GANs in Image Generation

no code implementations18 Apr 2022 Ziqiang Li, Beihao Xia, Jing Zhang, Chaoyue Wang, Bin Li

Generative Adversarial Networks (GANs) have achieved remarkable achievements in image synthesis.

Image Generation

Tightening the Approximation Error of Adversarial Risk with Auto Loss Function Search

no code implementations9 Nov 2021 Pengfei Xia, Ziqiang Li, Bin Li

The most common solution for this is to compute an approximate risk by replacing the 0-1 loss with a surrogate one.

Adversarial Robustness AutoML

Enhancing Backdoor Attacks with Multi-Level MMD Regularization

1 code implementation9 Nov 2021 Pengfei Xia, Hongjing Niu, Ziqiang Li, Bin Li

Then, ML-MMDR, a difference reduction method that adds multi-level MMD regularization into the loss, is proposed, and its effectiveness is testified on three typical difference-based defense methods.

Backdoor Attack

Exploring The Effect of High-frequency Components in GANs Training

2 code implementations20 Mar 2021 Ziqiang Li, Pengfei Xia, Xue Rui, Bin Li

Generative Adversarial Networks (GANs) have the ability to generate images that are visually indistinguishable from real images.

Vocal Bursts Intensity Prediction

A New Perspective on Stabilizing GANs training: Direct Adversarial Training

1 code implementation19 Aug 2020 Ziqiang Li, Pengfei Xia, Rentuo Tao, Hongjing Niu, Bin Li

Quite a number of methods have been proposed to stabilize the training of GANs, the focuses of which were respectively put on the loss functions, regularization and normalization technologies, training algorithms, and model architectures.

Adversarial Attack Image Generation

A Systematic Survey of Regularization and Normalization in GANs

1 code implementation19 Aug 2020 Ziqiang Li, Muhammad Usman, Rentuo Tao, Pengfei Xia, Chaoyue Wang, Huanhuan Chen, Bin Li

Although a handful number of regularization and normalization methods have been proposed for GANs, to the best of our knowledge, there exists no comprehensive survey that primarily focuses on objectives and development of these methods, apart from some in-comprehensive and limited scope studies.

Data Augmentation

Interpreting the Latent Space of GANs via Correlation Analysis for Controllable Concept Manipulation

no code implementations23 May 2020 Ziqiang Li, Rentuo Tao, Hongjing Niu, Bin Li

Generative adversarial nets (GANs) have been successfully applied in many fields like image generation, inpainting, super-resolution and drug discovery, etc., by now, the inner process of GANs is far from been understood.

Drug Discovery Image Generation +1

Cannot find the paper you are looking for? You can Submit a new open access paper.