Search Results for author: Jiawei Lian

Found 5 papers, 2 papers with code

PADetBench: Towards Benchmarking Physical Attacks against Object Detection

no code implementations17 Aug 2024 Jiawei Lian, Jianhong Pan, Lefan Wang, Yi Wang, Lap-Pui Chau, Shaohui Mei

Moreover, physical dynamics and cross-domain transformation are challenging to strictly regulate in the real world, leading to unaligned evaluation and comparison, severely hindering the development of physically robust models.

Adversarial Robustness Benchmarking +4

A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking

no code implementations21 Jun 2023 Shaohui Mei, Jiawei Lian, Xiaofei Wang, Yuru Su, Mingyang Ma, Lap-Pui Chau

Surprisingly, there has been a lack of comprehensive studies on the robustness of RS tasks, prompting us to undertake a thorough survey and benchmark on the robustness of image classification and object detection in RS.

Adversarial Robustness Benchmarking +3

CBA: Contextual Background Attack against Optical Aerial Detection in the Physical World

1 code implementation27 Feb 2023 Jiawei Lian, Xiaofei Wang, Yuru Su, Mingyang Ma, Shaohui Mei

To further strengthen the attack performance, the adversarial patches are forced to be outside targets during training, by which the detected objects of interest, both on and outside patches, benefit the accumulation of attack efficacy.

Adversarial Robustness

Contextual adversarial attack against aerial detection in the physical world

no code implementations27 Feb 2023 Jiawei Lian, Xiaofei Wang, Yuru Su, Mingyang Ma, Shaohui Mei

We propose an innovative contextual attack method against aerial detection in real scenarios, which achieves powerful attack performance and transfers well between various aerial object detectors without smearing or blocking the interested objects to hide.

Adversarial Attack Blocking

Benchmarking Adversarial Patch Against Aerial Detection

1 code implementation30 Oct 2022 Jiawei Lian, Shaohui Mei, Shun Zhang, Mingyang Ma

DNNs are vulnerable to adversarial examples, which poses great security concerns for security-critical systems.

Benchmarking

Cannot find the paper you are looking for? You can Submit a new open access paper.