Search Results for author: Lei Ma

Found 64 papers, 17 papers with code

Med-UniC: Unifying Cross-Lingual Medical Vision-Language Pre-Training by Diminishing Bias

no code implementations31 May 2023 Zhongwei Wan, Che Liu, Mi Zhang, Jie Fu, Benyou Wang, Sibo Cheng, Lei Ma, César Quilodrán-Casas, Rossella Arcucci

Med-UniC reaches superior performance across 5 medical image tasks and 10 datasets encompassing over 30 diseases, offering a versatile framework for unifying multi-modal medical data within diverse linguistic communities.

Evading DeepFake Detectors via Adversarial Statistical Consistency

no code implementations CVPR 2023 Yang Hou, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Jianjun Zhao

Second, we find that the statistical differences between natural and DeepFake images are positively associated with the distribution shifting between the two kinds of images, and we propose to use a distribution-aware loss to guide the optimization of different degradations.

DeepFake Detection Face Swapping

Construction of unbiased dental template and parametric dental model for precision digital dentistry

no code implementations7 Apr 2023 Lei Ma, Jingyang Zhang, Ke Deng, Peng Xue, Zhiming Cui, Yu Fang, Minhui Tang, Yue Zhao, Min Zhu, Zhongxiang Ding, Dinggang Shen

In this study, we develop an unbiased dental template by constructing an accurate dental atlas from CBCT images with guidance of teeth segmentation.

Image Cropping

Structure-aware registration network for liver DCE-CT images

no code implementations8 Mar 2023 Peng Xue, Jingyang Zhang, Lei Ma, Mianxin Liu, Yuning Gu, Jiawei Huang, Feihong Liua, Yongsheng Pan, Xiaohuan Cao, Dinggang Shen

In addition, such paired organ segmentations are not always available in DCE-CT images due to the flow of contrast agents.

Image Registration

DeepLens: Interactive Out-of-distribution Data Detection in NLP Models

1 code implementation2 Mar 2023 Da Song, Zhijie Wang, Yuheng Huang, Lei Ma, Tianyi Zhang

In this work, we propose DeepLens, an interactive system that helps users detect and explore OOD issues in massive text corpora.

Text Clustering

DeepSeer: Interactive RNN Explanation and Debugging via State Abstraction

1 code implementation2 Mar 2023 Zhijie Wang, Yuheng Huang, Da Song, Lei Ma, Tianyi Zhang

The core of DeepSeer is a state abstraction method that bundles semantically similar hidden states in an RNN model and abstracts the model as a finite state machine.

Neural Episodic Control with State Abstraction

no code implementations27 Jan 2023 Zhuo Li, Derui Zhu, Yujing Hu, Xiaofei Xie, Lei Ma, Yan Zheng, Yan Song, Yingfeng Chen, Jianjun Zhao

Generally, episodic control-based approaches are solutions that leverage highly-rewarded past experiences to improve sample efficiency of DRL algorithms.

OpenAI Gym

An Exploratory Study of AI System Risk Assessment from the Lens of Data Distribution and Uncertainty

no code implementations13 Dec 2022 Zhijie Wang, Yuheng Huang, Lei Ma, Haruki Yokoyama, Susumu Tokumoto, Kazuki Munakata

More importantly, it also lacks systematic investigation on how to perform the risk assessment for AI systems from unit level to system level.

AI-driven Mobile Apps: an Explorative Study

1 code implementation3 Dec 2022 Yinghua Li, Xueqi Dang, Haoye Tian, Tiezhu Sun, Zhijie Wang, Lei Ma, Jacques Klein, Tegawende F. Bissyande

In this paper, we conduct the most extensive empirical study on 56, 682 published AI apps from three perspectives: dataset characteristics, development issues, and user feedback and privacy.

FAF: A novel multimodal emotion recognition approach integrating face, body and text

no code implementations20 Nov 2022 Zhongyu Fang, Aoyun He, Qihui Yu, Baopeng Gao, Weiping Ding, Tong Zhang, Lei Ma

In this paper, we developed a large multimodal emotion dataset, named "HED" dataset, to facilitate the emotion recognition task, and accordingly propose a multimodal emotion recognition method.

Multimodal Emotion Recognition

Common Corruption Robustness of Point Cloud Detectors: Benchmark and Enhancement

no code implementations12 Oct 2022 Shuangzhi Li, Zhijie Wang, Felix Juefei-Xu, Qing Guo, Xingyu Li, Lei Ma

Then, for the first attempt, we construct a benchmark based on the physical-aware common corruptions for point cloud detectors, which contains a total of 1, 122, 150 examples covering 7, 481 scenes, 25 common corruption types, and 6 severities.

Autonomous Driving Cloud Detection +4

Decompiling x86 Deep Neural Network Executables

no code implementations3 Oct 2022 Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma

BTD takes DNN executables and outputs full model specifications, including types of DNN operators, network topology, dimensions, and parameters that are (nearly) identical to those of the input models.

DARTSRepair: Core-failure-set Guided DARTS for Network Robustness to Common Corruptions

no code implementations21 Sep 2022 Xuhong Ren, Jianlang Chen, Felix Juefei-Xu, Wanli Xue, Qing Guo, Lei Ma, Jianjun Zhao, ShengYong Chen

Then, we propose a novel core-failure-set guided DARTS that embeds a K-center-greedy algorithm for DARTS to select suitable corrupted failure examples to refine the model architecture.

Data Augmentation

Uncertainty Guided Depth Fusion for Spike Camera

no code implementations26 Aug 2022 Jianing Li, Jiaming Liu, Xiaobao Wei, Jiyuan Zhang, Ming Lu, Lei Ma, Li Du, Tiejun Huang, Shanghang Zhang

In this paper, we propose a novel Uncertainty-Guided Depth Fusion (UGDF) framework to fuse the predictions of monocular and stereo depth estimation networks for spike camera.

Autonomous Driving Stereo Depth Estimation

Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation

1 code implementation22 Jul 2022 Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon

Recent studies show that test selection for DNN is a promising direction that tackles this issue by selecting minimal representative data to label and using these data to assess the model.

Learning towards Synchronous Network Memorizability and Generalizability for Continual Segmentation across Multiple Sites

no code implementations14 Jun 2022 Jingyang Zhang, Peng Xue, Ran Gu, Yuning Gu, Mianxin Liu, Yongsheng Pan, Zhiming Cui, Jiawei Huang, Lei Ma, Dinggang Shen

In clinical practice, a segmentation network is often required to continually learn on a sequential data stream from multiple sites rather than a consolidated set, due to the storage cost and privacy restriction.

Continual Learning

CodeS: Towards Code Model Generalization Under Distribution Shift

no code implementations11 Jun 2022 Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon

Distribution shift has been a longstanding challenge for the reliable deployment of deep learning (DL) models due to unexpected accuracy degradation.

Benchmarking Code Classification

NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks

no code implementations24 Mar 2022 Xiaofei Xie, Tianlin Li, Jian Wang, Lei Ma, Qing Guo, Felix Juefei-Xu, Yang Liu

Inspired by software testing, a number of structural coverage criteria are designed and proposed to measure the test adequacy of DNNs.

Defect Detection DNN Testing +1

1000x Faster Camera and Machine Vision with Ordinary Devices

no code implementations23 Jan 2022 Tiejun Huang, Yajing Zheng, Zhaofei Yu, Rui Chen, Yuan Li, Ruiqin Xiong, Lei Ma, Junwei Zhao, Siwei Dong, Lin Zhu, Jianing Li, Shanshan Jia, Yihua Fu, Boxin Shi, Si Wu, Yonghong Tian

By treating vidar as spike trains in biological vision, we have further developed a spiking neural network-based machine vision system that combines the speed of the machine and the mechanism of biological vision, achieving high-speed object detection and tracking 1, 000x faster than human vision.

object-detection Object Detection

Uncertainty-Aware Cascaded Dilation Filtering for High-Efficiency Deraining

1 code implementation7 Jan 2022 Qing Guo, Jingyang Sun, Felix Juefei-Xu, Lei Ma, Di Lin, Wei Feng, Song Wang

First, we propose the uncertainty-aware cascaded predictive filtering (UC-PFilt) that can identify the difficulties of reconstructing clean pixels via predicted kernels and remove the residual rain traces effectively.

Data Augmentation Single Image Deraining +1

Towards Understanding Quality Challenges of the Federated Learning for Neural Networks: A First Look from the Lens of Robustness

1 code implementation5 Jan 2022 Amin Eslami Abyane, Derui Zhu, Roberto Souza, Lei Ma, Hadi Hemmati

Therefore, to better understand the current quality status and challenges of these SOTA FL techniques in the presence of attacks and faults, we perform a large-scale empirical study to investigate the SOTA FL's quality from multiple angles of attacks, simulated faults (via mutation operators), and aggregation (defense) methods.

Data Poisoning Federated Learning +2

A Robust Visual Sampling Model Inspired by Receptive Field

no code implementations4 Jan 2022 Liwen Hu, Lei Ma, Dawei Weng, Tiejun Huang

More importantly, due to mimicking receptive field mechanism to collect regional information, RVSM can filter high intensity noise effectively and improves the problem that Spike camera is sensitive to noise largely.

Quantization

ArchRepair: Block-Level Architecture-Oriented Repairing for Deep Neural Networks

no code implementations26 Nov 2021 Hua Qi, Zhijie Wang, Qing Guo, Jianlang Chen, Felix Juefei-Xu, Lei Ma, Jianjun Zhao

In this work, as the first attempt, we initiate to repair DNNs by jointly optimizing the architecture and weights at a higher (i. e., block) level.

PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing

no code implementations19 Nov 2021 Yuheng Huang, Lei Ma, Yuanchun Li

Vision Transformer (ViT) is known to be highly nonlinear like other classical neural networks and could be easily fooled by both natural and adversarial patch perturbations.

GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search

1 code implementation4 Nov 2021 Shangqing Liu, Xiaofei Xie, JingKai Siow, Lei Ma, Guozhu Meng, Yang Liu

Specifically, we propose to construct graphs for the source code and queries with bidirectional GGNN (BiGGNN) to capture the local structural information of the source code and queries.

Code Search Code Summarization +3

Optical Flow Estimation for Spiking Camera

1 code implementation CVPR 2022 Liwen Hu, Rui Zhao, Ziluo Ding, Lei Ma, Boxin Shi, Ruiqin Xiong, Tiejun Huang

Further, for training SCFlow, we synthesize two sets of optical flow data for the spiking camera, SPIkingly Flying Things and Photo-realistic High-speed Motion, denoted as SPIFT and PHM respectively, corresponding to random high-speed and well-designed scenes.

Event-based vision Motion Estimation +1

SkullEngine: A Multi-stage CNN Framework for Collaborative CBCT Image Segmentation and Landmark Detection

no code implementations7 Oct 2021 Qin Liu, Han Deng, Chunfeng Lian, Xiaoyang Chen, Deqiang Xiao, Lei Ma, Xu Chen, Tianshu Kuang, Jaime Gateno, Pew-Thian Yap, James J. Xia

We propose a multi-stage coarse-to-fine CNN-based framework, called SkullEngine, for high-resolution segmentation and large-scale landmark detection through a collaborative, integrated, and scalable JSD model and three segmentation and landmark detection refinement models.

Image Segmentation Semantic Segmentation

CarveNet: Carving Point-Block for Complex 3D Shape Completion

no code implementations28 Jul 2021 Qing Guo, Zhijie Wang, Felix Juefei-Xu, Di Lin, Lei Ma, Wei Feng, Yang Liu

3D point cloud completion is very challenging because it heavily relies on the accurate understanding of the complex 3D shapes (e. g., high-curvature, concave/convex, and hollowed-out 3D shapes) and the unknown & diverse patterns of the partially available point clouds.

Data Augmentation Point Cloud Completion

Learning to Adversarially Blur Visual Object Tracking

1 code implementation ICCV 2021 Qing Guo, Ziyi Cheng, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yang Liu, Jianjun Zhao

In this work, we explore the robustness of visual object trackers against motion blur from a new angle, i. e., adversarial blur attack (ABA).

Visual Object Tracking Visual Tracking

AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning

no code implementations14 Jul 2021 Yihao Huang, Qing Guo, Felix Juefei-Xu, Lei Ma, Weikai Miao, Yang Liu, Geguang Pu

To this end, we first comprehensively investigate two kinds of pixel denoising methods for adversarial robustness enhancement (i. e., existing additive-based and unexplored filtering-based methods) under the loss functions of image-level and semantic-level, respectively, showing that pixel-wise filtering can obtain much higher image quality (e. g., higher PSNR) as well as higher robustness (e. g., higher accuracy on adversarial examples) than existing pixel-wise additive-based method.

Adversarial Attack Adversarial Robustness +1

DeepMix: Online Auto Data Augmentation for Robust Visual Object Tracking

no code implementations23 Apr 2021 Ziyi Cheng, Xuhong Ren, Felix Juefei-Xu, Wanli Xue, Qing Guo, Lei Ma, Jianjun Zhao

Online updating of the object model via samples from historical frames is of great importance for accurate visual object tracking.

Data Augmentation Visual Object Tracking

Countering Malicious DeepFakes: Survey, Battleground, and Horizon

1 code implementation27 Feb 2021 Felix Juefei-Xu, Run Wang, Yihao Huang, Qing Guo, Lei Ma, Yang Liu

To fill this gap, in this paper, we provide a comprehensive overview and detailed analysis of the research work on the topic of DeepFake generation, DeepFake detection as well as evasion of DeepFake detection, with more than 318 research papers carefully surveyed.

DeepFake Detection Face Swapping +1

AttackDist: Characterizing Zero-day Adversarial Samples by Counter Attack

no code implementations1 Jan 2021 Simin Chen, Zihe Song, Lei Ma, Cong Liu, Wei Yang

We first theoretically clarify under which condition AttackDist can provide a certified detecting performance, then show that a potential application of AttackDist is distinguishing zero-day adversarial examples without knowing the mechanisms of new attacks.

Sparta: Spatially Attentive and Adversarially Robust Activations

no code implementations1 Jan 2021 Qing Guo, Felix Juefei-Xu, Changqing Zhou, Lei Ma, Xiaofei Xie, Wei Feng, Yang Liu

Moreover, comprehensive evaluations have demonstrated two important properties of our method: First, superior transferability across DNNs.

Denoising

EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining

2 code implementations19 Sep 2020 Qing Guo, Jingyang Sun, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Wei Feng, Yang Liu

To fill this gap, in this paper, we regard the single-image deraining as a general image-enhancing problem and originally propose a model-free deraining method, i. e., EfficientDeRain, which is able to process a rainy image within 10~ms (i. e., around 6~ms on average), over 80 times faster than the state-of-the-art method (i. e., RCDNet), while achieving similar de-rain effects.

Data Augmentation Single Image Deraining

Adversarial Rain Attack and Defensive Deraining for DNN Perception

no code implementations19 Sep 2020 Liming Zhai, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Lei Ma, Wei Feng, Shengchao Qin, Yang Liu

To defend the DNNs from the negative rain effect, we also present a defensive deraining strategy, for which we design an adversarial rain augmentation that uses mixed adversarial rain layers to enhance deraining models for downstream DNN perception.

Adversarial Attack Autonomous Driving +5

DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms

no code implementations13 Jun 2020 Hua Qi, Qing Guo, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Wei Feng, Yang Liu, Jianjun Zhao

As the GAN-based face image and video generation techniques, widely known as DeepFakes, have become more and more matured and realistic, there comes a pressing and urgent demand for effective DeepFakes detectors.

DeepFake Detection Face Swapping +2

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction

1 code implementation13 Jun 2020 Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu

At this moment, GAN-based image generation methods are still imperfect, whose upsampling design has limitations in leaving some certain artifact patterns in the synthesized image.

DeepFake Detection Face Swapping +2

Satellite-Terrestrial Channel Characterization in High-Speed Railway Environment at 22.6 GHz

no code implementations11 Jun 2020 Lei Ma, Ke Guan, Dong Yan, Danping He, Nuno R. Leonor, Bo Ai, Junhyeong Kim

In this paper, the satellite-terrestrial channel at 22. 6 GHz is characterized for a typical high-speed railway (HSR) environment.

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning

no code implementations14 May 2020 Jianwen Sun, Tianwei Zhang, Xiaofei Xie, Lei Ma, Yan Zheng, Kangjie Chen, Yang Liu

Adversarial attacks against conventional Deep Learning (DL) systems and algorithms have been widely studied, and various defenses were proposed.

Adversarial Attack reinforcement-learning +1

Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty

no code implementations24 Apr 2020 Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun

Based on this, we propose an automated testing technique to generate multiple types of uncommon AEs and BEs that are largely missed by existing techniques.

Adversarial Attack

Byzantine-resilient Decentralized Stochastic Gradient Descent

no code implementations20 Feb 2020 Shangwei Guo, Tianwei Zhang, Han Yu, Xiaofei Xie, Lei Ma, Tao Xiang, Yang Liu

It guarantees that each benign node in a decentralized system can train a correct model under very strong Byzantine attacks with an arbitrary number of faulty nodes.

Edge-computing Image Classification

Amora: Black-box Adversarial Morphing Attack

no code implementations9 Dec 2019 Run Wang, Felix Juefei-Xu, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Yang Liu

In this paper, we investigate and introduce a new type of adversarial attack to evade FR systems by manipulating facial content, called \textbf{\underline{a}dversarial \underline{mor}phing \underline{a}ttack} (a. k. a.

Adversarial Attack Dictionary Learning +3

SPARK: Spatial-aware Online Incremental Attack Against Visual Tracking

1 code implementation ECCV 2020 Qing Guo, Xiaofei Xie, Felix Juefei-Xu, Lei Ma, Zhongguo Li, Wanli Xue, Wei Feng, Yang Liu

We identify that online object tracking poses two new challenges: 1) it is difficult to generate imperceptible perturbations that can transfer across frames, and 2) real-time trackers require the attack to satisfy a certain level of efficiency.

Adversarial Attack Video Object Tracking +2

An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms

no code implementations15 Sep 2019 Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li

However, the differences in architecture designs and implementations of existing frameworks and platforms bring new challenges for DL software development and deployment.

Adversarial Attack Adversarial Robustness +1

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces

no code implementations13 Sep 2019 Run Wang, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yihao Huang, Jian Wang, Yang Liu

In recent years, generative adversarial networks (GANs) and its variants have achieved unprecedented success in image synthesis.

Face Detection Face Recognition +2

Hierarchy Neighborhood Discriminative Hashing for An Unified View of Single-Label and Multi-Label Image retrieval

no code implementations10 Jan 2019 Lei Ma, Hongliang Li, Qingbo Wu, Fanman Meng, King Ngi Ngan

Finally, we propose a hierarchy neighborhood discriminative hashing loss to unify the single-label and multilabel image retrieval problem with a one-stream deep neural network architecture.

Multi-Label Image Retrieval Retrieval +2

DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems

no code implementations13 Dec 2018 Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Jianjun Zhao, Yang Liu

Our in-depth evaluation on a state-of-the-art speech-to-text DL system demonstrates the effectiveness of our technique in improving quality and reliability of stateful DL systems.

An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms

no code implementations13 Nov 2018 Qianyu Guo, Xiaofei Xie, Lei Ma, Qiang Hu, Ruitao Feng, Li Li, Yang Liu, Jianjun Zhao, Xiaohong Li

Up to the present, it still lacks a comprehensive study on how current diverse DL frameworks and platforms influence the DL software development process.

Autonomous Driving

Secure Deep Learning Engineering: A Software Quality Assurance Perspective

no code implementations10 Oct 2018 Lei Ma, Felix Juefei-Xu, Minhui Xue, Qiang Hu, Sen Chen, Bo Li, Yang Liu, Jianjun Zhao, Jianxiong Yin, Simon See

Over the past decades, deep learning (DL) systems have achieved tremendous success and gained great popularity in various applications, such as intelligent machines, image processing, speech processing, and medical diagnostics.

Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer

no code implementations7 Sep 2018 Alvin Chan, Lei Ma, Felix Juefei-Xu, Xiaofei Xie, Yang Liu, Yew Soon Ong

Deep neural networks (DNN), while becoming the driving force of many novel technology and achieving tremendous success in many cutting-edge applications, are still vulnerable to adversarial attacks.

Question Answering

DeepHunter: Hunting Deep Neural Network Defects via Coverage-Guided Fuzzing

no code implementations4 Sep 2018 Xiaofei Xie, Lei Ma, Felix Juefei-Xu, Hongxu Chen, Minhui Xue, Bo Li, Yang Liu, Jianjun Zhao, Jianxiong Yin, Simon See

In company with the data explosion over the past decade, deep neural network (DNN) based software has experienced unprecedented leap and is becoming the key driving force of many novel industrial applications, including many safety-critical scenarios such as autonomous driving.

Autonomous Driving Quantization

Combinatorial Testing for Deep Learning Systems

no code implementations20 Jun 2018 Lei Ma, Fuyuan Zhang, Minhui Xue, Bo Li, Yang Liu, Jianjun Zhao, Yadong Wang

Deep learning (DL) has achieved remarkable progress over the past decade and been widely applied to many safety-critical applications.

Defect Detection

DeepLaser: Practical Fault Attack on Deep Neural Networks

no code implementations15 Jun 2018 Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu

As deep learning systems are widely adopted in safety- and security-critical applications, such as autonomous vehicles, banking systems, etc., malicious faults and attacks become a tremendous concern, which potentially could lead to catastrophic consequences.

Autonomous Vehicles

DeepMutation: Mutation Testing of Deep Learning Systems

4 code implementations14 May 2018 Lei Ma, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Felix Juefei-Xu, Chao Xie, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang

To do this, by sharing the same spirit of mutation testing in traditional software, we first define a set of source-level mutation operators to inject faults to the source of DL (i. e., training data and training programs).

Software Engineering

DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems

no code implementations20 Mar 2018 Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang

Deep learning (DL) defines a new data-driven programming paradigm that constructs the internal system logic of a crafted neuron network through a set of training data.

Adversarial Attack Defect Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.