Search Results for author: Xiao-Feng Wang

Found 15 papers, 5 papers with code

The Tsinghua University-Ma Huateng Telescopes for Survey: Overview and Performance of the System

no code implementations21 Dec 2020 Ji-Cheng Zhang, Xiao-Feng Wang, Jun Mo, Gao-Bo Xi, Jie Lin, Xiao-Jun Jiang, Xiao-Ming Zhang, Wen-Xiong Li, Sheng-Yu Yan, Zhi-Hao Chen, Lei Hu, Xue Li, Wei-Li Lin, Han Lin, Cheng Miao, Li-Ming Rui, Han-Na Sai, Dan-Feng Xiang, Xing-Han Zhang

The TMTS system can have a FoV of about 9 deg2 when monitoring the sky with two bands (i. e., SDSS g and r filters) at the same time, and a maximum FoV of ~18 deg2 when four telescopes monitor different sky areas in monochromatic filter mode.

Instrumentation and Methods for Astrophysics

Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection

1 code implementation2 Aug 2019 Di Tang, Xiao-Feng Wang, Haixu Tang, Kehuan Zhang

A security threat to deep neural networks (DNN) is backdoor contamination, in which an adversary poisons the training data of a target model to inject a Trojan so that images carrying a specific trigger will always be classified into a specific label.

Cryptography and Security

LISA: a MATLAB package for Longitudinal Image Sequence Analysis

no code implementations16 Feb 2019 Jang Ik Cho, Xiao-Feng Wang, Yifan Xu, Jiayang Sun

Given two contrasting sequences of images, the image processing in LISA starts with selecting a region of interest in two representative images, followed by automatic or manual segmentation and registration.

Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home

no code implementations3 May 2018 Nan Zhang, Xianghang Mi, Xuan Feng, Xiao-Feng Wang, Yuan Tian, Feng Qian

The significance of our findings have already been acknowledged by Amazon and Google, and further evidenced by the risky skills discovered on Alexa and Google markets by the new detection systems we built.

Cryptography and Security

Invisible Mask: Practical Attacks on Face Recognition with Infrared

no code implementations13 Mar 2018 Zhe Zhou, Di Tang, Xiao-Feng Wang, Weili Han, Xiangyu Liu, Kehuan Zhang

We propose a kind of brand new attack against face recognition systems, which is realized by illuminating the subject using infrared according to the adversarial examples worked out by our algorithm, thus face recognition systems can be bypassed or misled while simultaneously the infrared perturbations cannot be observed by raw eyes.

Cryptography and Security

Understanding Membership Inferences on Well-Generalized Learning Models

1 code implementation13 Feb 2018 Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiao-Feng Wang, Haixu Tang, Carl A. Gunter, Kai Chen

Membership Inference Attack (MIA) determines the presence of a record in a machine learning model's training data by querying the model.

Inference Attack Membership Inference Attack

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

no code implementations24 Jan 2018 Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiao-Feng Wang, Carl A. Gunter

For this purpose, we developed novel techniques that address a key technical challenge: integrating the commands into a song in a way that can be effectively recognized by ASR through the air, in the presence of background noise, while not being detected by a human listener.

Speech Recognition

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

no code implementations5 Jan 2018 Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiao-Feng Wang, Kehuan Zhang

In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.

Cryptography and Security

Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12

no code implementations8 Sep 2017 Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, Xiao-Feng Wang

We discover and describe Apple's set-up for differentially private data processing, including the overall data pipeline, the parameters used for differentially private perturbation of each piece of data, and the frequency with which such data is sent to Apple's servers.

Optimizing Filter Size in Convolutional Neural Networks for Facial Action Unit Recognition

no code implementations CVPR 2018 Shizhong Han, Zibo Meng, Zhiyuan Li, James O'Reilly, Jie Cai, Xiao-Feng Wang, Yan Tong

Most recently, Convolutional Neural Networks (CNNs) have shown promise for facial AU recognition, where predefined and fixed convolution filter sizes are employed.

Facial Action Unit Detection

Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction

1 code implementation23 May 2017 Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiao-Feng Wang

Consequently, the adversarial example can be effectively detected by comparing the classification results of a given sample and its denoised version, without referring to any prior knowledge of attacks.

Quantization

DIMM-SC: A Dirichlet mixture model for clustering droplet-based single cell transcriptomic data

no code implementations6 Apr 2017 Zhe Sun, Ting Wang, Ke Deng, Xiao-Feng Wang, Robert Lafyatis, Ying Ding, Ming Hu, Wei Chen

More importantly, as a model-based approach, DIMM-SC is able to quantify the clustering uncertainty for each single cell, facilitating rigorous statistical inference and biological interpretations, which are typically unavailable from existing clustering methods.

Cannot find the paper you are looking for? You can Submit a new open access paper.