no code implementations • 29 Nov 2024 • Linshan Hou, Wei Luo, Zhongyun Hua, Songhua Chen, Leo Yu Zhang, Yiming Li
As a result, purification methods that analyze the separation between the poisoned and benign samples in the input-output space or the final hidden layer space are less effective.
no code implementations • 28 Nov 2024 • Sihang Li, Siqi Tan, Bowen Chang, Jing Zhang, Chen Feng, Yiming Li
In this work, we aim to unleash the power of data synthesis to promote the generalizability of pose regression.
no code implementations • 19 Nov 2024 • Huaizhi Ge, Yiming Li, Qifan Wang, Yongfeng Zhang, Ruixiang Tang
Large Language Models (LLMs) are vulnerable to backdoor attacks, where hidden triggers can maliciously manipulate model behavior.
no code implementations • 6 Nov 2024 • Yiming Li, Fang Li, Kirk Roberts, Licong Cui, Cui Tao, Hua Xu
Evaluation metrics included token-level analysis (BLEU, ROUGE-1, ROUGE-2, ROUGE-L) and semantic similarity scores between model-generated summaries and physician-written gold standards.
1 code implementation • 28 Oct 2024 • Taiyi Pan, Junyang He, Chao Chen, Yiming Li, Chen Feng
Visual place recognition (VPR) enables autonomous robots to identify previously visited locations, which contributes to tasks like simultaneous localization and mapping (SLAM).
Simultaneous Localization and Mapping Visual Place Recognition
no code implementations • 15 Oct 2024 • Yiming Li, Yi Wang, Wenqian Wang, Dan Lin, Bingbing Li, Kim-Hui Yap
Exploring new knowledge is a fundamental human ability that can be mirrored in the development of deep neural networks, especially in the field of object detection.
1 code implementation • 14 Oct 2024 • Boheng Li, Yanhao Wei, Yankai Fu, Zhenting Wang, Yiming Li, Jie Zhang, Run Wang, Tianwei Zhang
In this paper, we introduce SIREN, a novel methodology to proactively trace unauthorized data usage in black-box personalized text-to-image diffusion models.
1 code implementation • 20 Sep 2024 • Zhangchen Ye, Tao Jiang, Chenfeng Xu, Yiming Li, Hang Zhao
Vision-based 3D occupancy prediction is significantly challenged by the inherent limitations of monocular vision in depth estimation.
1 code implementation • 15 Aug 2024 • Yiming Li, Zhifang Guo, Xiangdong Wang, Hong Liu
Recent advances have been witnessed in audio-language joint learning, such as CLAP, that shows much success in multi-modal understanding tasks.
1 code implementation • 10 Aug 2024 • Cheng Wei, Yang Wang, Kuofeng Gao, Shuo Shao, Yiming Li, Zhibo Wang, Zhan Qin
We achieve this goal by designing a scalable clean-label backdoor-based dataset watermark for point clouds that ensures both effectiveness and stealthiness.
no code implementations • 29 Jul 2024 • Zhixuan Chu, Hui Ding, Guang Zeng, Shiyu Wang, Yiming Li
Although the widespread use of AI systems in today's world is growing, many current AI systems are found vulnerable due to hidden bias and missing information, especially in the most commonly used forecasting system.
no code implementations • 12 Jul 2024 • Yuchen Yang, Hongwei Yao, Bingrun Yang, Yiling He, Yiming Li, Tianwei Zhang, Zhan Qin, Kui Ren
To inherit the advantages of both backdoor and adversarial attacks, this paper proposes a new attack paradigm, i. e., target-specific and adversarial prompt injection (TAPI), against Code LLMs.
no code implementations • 26 Jun 2024 • Yiming Li, Deepthi Viswaroopan, William He, Jianfu Li, Xu Zuo, Hua Xu, Cui Tao
This study aims to evaluate the effectiveness of LLMs and traditional deep learning models in AE extraction, and to assess the impact of ensembling these models on performance.
no code implementations • 25 Jun 2024 • Zonglin Lyu, Juexiao Zhang, Mingxuan Lu, Yiming Li, Chen Feng
Our key design is to use vision-based retrieval to propose several candidates and then leverage language-based reasoning to carefully inspect each candidate for a final decision.
no code implementations • CVPR 2024 • Yiming Li, Zhiheng Li, Nuo Chen, Moonjun Gong, Zonglin Lyu, Zehong Wang, Peili Jiang, Chen Feng
More specifically, MARS is collected with a fleet of autonomous vehicles driving within a certain geographical area.
1 code implementation • 27 May 2024 • Yiming Li, Zehong Wang, Yue Wang, Zhiding Yu, Zan Gojcic, Marco Pavone, Chen Feng, Jose M. Alvarez
Humans naturally retain memories of permanent elements, while ephemeral moments often slip through the cracks of memory.
no code implementations • 25 May 2024 • Wenfei Liang, Yanan Zhao, Rui She, Yiming Li, Wee Peng Tay
Personalized subgraph Federated Learning (FL) is a task that customizes Graph Neural Networks (GNNs) to individual client needs, accommodating diverse data distributions.
1 code implementation • 22 May 2024 • Fangqiang Ding, Xiangyu Wen, Yunzhou Zhu, Yiming Li, Chris Xiaoxuan Lu
Current methods predominantly rely on LiDAR or camera inputs for 3D occupancy prediction.
1 code implementation • CVPR 2024 • Boheng Li, Yishuo Cai, Haowei Li, Feng Xue, Zhifeng Li, Yiming Li
Model quantization is widely used to compress and accelerate deep neural networks.
1 code implementation • 18 May 2024 • Biao Yi, Sishuo Chen, Yiming Li, Tong Li, Baolei Zhang, Zheli Liu
Backdoor attacks pose an increasingly severe security threat to Deep Neural Networks (DNNs) during their development stage.
1 code implementation • 17 May 2024 • Sheng Yang, Jiawang Bai, Kuofeng Gao, Yong Yang, Yiming Li, Shu-Tao Xia
The experiments on diverse visual recognition tasks confirm the success of our switchable backdoor attack, i. e., achieving 95%+ attack success rate, and also being hard to be detected and removed.
2 code implementations • 16 May 2024 • Linshan Hou, Ruili Feng, Zhongyun Hua, Wei Luo, Leo Yu Zhang, Yiming Li
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries can maliciously trigger model misclassifications by implanting a hidden backdoor during model training.
1 code implementation • 8 May 2024 • Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren
Motivated by this understanding, we design a new watermarking paradigm, $i. e.$, Explanation as a Watermark (EaaW), that implants verification behaviors into the explanation of feature attribution instead of model predictions.
no code implementations • 8 Apr 2024 • Yiming Li, Xueqing Peng, Jianfu Li, Xu Zuo, Suyuan Peng, Donghong Pei, Cui Tao, Hua Xu, Na Hong
This study underscores the effectiveness of LLMs like GPT in extracting relations related to acupoint locations, with implications for accurately modeling acupuncture knowledge and promoting standard implementation in acupuncture training and practice.
1 code implementation • 3 Apr 2024 • Fengyuan Liu, Haochen Luo, Yiming Li, Philip Torr, Jindong Gu
In this work, we study the origin attribution of generated images in a practical setting where only a few images generated by a source model are available and the source model cannot be accessed.
no code implementations • 8 Mar 2024 • Suozhi Huang, Juexiao Zhang, Yiming Li, Chen Feng
This proactive understanding of the visual features' relevance does not require the transmission of the features themselves, enhancing both communication and computation efficiency.
1 code implementation • 28 Feb 2024 • Yiming Li, Zhao Zhang
Conversational multi-doc question answering aims to answer specific questions based on the retrieved documents as well as the contextual conversations.
no code implementations • 6 Feb 2024 • Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson
Vertical Federated Learning (VFL) is a federated learning paradigm where multiple participants, who share the same set of samples but hold different features, jointly train machine learning models.
no code implementations • 26 Jan 2024 • Dan Lin, Philip Hann Yung Lee, Yiming Li, Ruoyu Wang, Kim-Hui Yap, Bingbing Li, You Shing Ngim
Driver Action Recognition (DAR) is crucial in vehicle cabin monitoring systems.
1 code implementation • CVPR 2024 • Sheng Yang, Jiawang Bai, Kuofeng Gao, Yong Yang, Yiming Li, Shu-Tao Xia
The experiments on diverse visual recognition tasks confirm the success of our switchable backdoor attack i. e. achieving 95%+ attack success rate and also being hard to be detected and removed.
1 code implementation • 21 Dec 2023 • Yiming Li, Zeyu Li, Zhihui Gao, Tingjun Chen
First, we develop an automated framework that seamlessly integrates three open-source tools: OpenStreetMap (geographic databases), Blender (computer graphics), and Sionna (ray tracing), enabling the efficient generation of large-scale 3D building maps and ray tracing models.
no code implementations • 3 Dec 2023 • Yiming Li, Mingyan Zhu, Junfeng Guo, Tao Wei, Shu-Tao Xia, Zhan Qin
We argue that the intensity constraint of existing SSBAs is mostly because their trigger patterns are `content-irrelevant' and therefore act as `noises' for both humans and DNNs.
1 code implementation • 17 Oct 2023 • Xinhao Liu, Moonjun Gong, Qi Fang, Haoyu Xie, Yiming Li, Hang Zhao, Chen Feng
In this paper, we introduce a novel LiDAR perception task of Occupancy Completion and Forecasting (OCF) in the context of autonomous driving to unify these aspects into a cohesive framework.
no code implementations • 30 Sep 2023 • Lei Yang, Jiaxin Yu, Xinyu Zhang, Jun Li, Li Wang, Yi Huang, Chuang Zhang, Hong Wang, Yiming Li
We discover that most existing monocular 3D object detectors rely on the ego-vehicle prior assumption that the optical axis of the camera is parallel to the ground.
no code implementations • 28 Sep 2023 • Yiming Li, Jianfu Li, Jianping He, Cui Tao
Though Vaccines are instrumental in global health, mitigating infectious diseases and pandemic outbreaks, they can occasionally lead to adverse events (AEs).
no code implementations • 15 Sep 2023 • Yiming Li, Xiangdong Wang, Hong Liu, Rui Tao, Long Yan, Kazushige Ouchi
Then, the local consistency is adopted to encourage the model to leverage local features for frame-level predictions, and the global consistency is applied to force features to align with global prototypes through a specially designed contrastive loss.
no code implementations • 15 Sep 2023 • Yiming Li, Xiangdong Wang, Hong Liu
Contrastive Language-Audio Pretraining (CLAP) is pre-trained to associate audio features with human language, making it a natural zero-shot classifier to recognize unseen sound categories.
1 code implementation • ICCV 2023 • Guanhao Gan, Yiming Li, Dongxian Wu, Shu-Tao Xia
To protect the copyright of DNNs, backdoor-based ownership verification becomes popular recently, in which the model owner can watermark the model by embedding a specific backdoor behavior before releasing it.
no code implementations • 23 Aug 2023 • Tinghao Xie, Xiangyu Qi, Ping He, Yiming Li, Jiachen T. Wang, Prateek Mittal
We present a novel defense, against backdoor attacks on Deep Neural Networks (DNNs), wherein adversaries covertly implant malicious behaviors (backdoors) into DNNs.
1 code implementation • ICCV 2023 • Jianshuo Dong, Han Qiu, Yiming Li, Tianwei Zhang, Yuanjie Li, Zeqi Lai, Chao Zhang, Shu-Tao Xia
We propose a training-assisted bit flip attack, in which the adversary is involved in the training stage to build a high-risk model to release.
1 code implementation • 17 Jul 2023 • Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li
Motivated by these findings, we propose to exploit elements of sound ($e. g.$, pitch and timbre) to design more stealthy yet effective poison-only backdoor attacks.
1 code implementation • 15 Jun 2023 • Yiming Li, Sihang Li, Xinhao Liu, Moonjun Gong, Kenan Li, Nuo Chen, Zijun Wang, Zhiheng Li, Tao Jiang, Fisher Yu, Yue Wang, Hang Zhao, Zhiding Yu, Chen Feng
Monocular scene understanding is a foundational component of autonomous systems.
3D Semantic Scene Completion 3D Semantic Scene Completion from a single 2D image
1 code implementation • 11 May 2023 • Yinghua Gao, Yiming Li, Xueluan Gong, Zhifeng Li, Shu-Tao Xia, Qian Wang
More importantly, it is not feasible to simply combine existing methods to design an effective sparse and invisible backdoor attack.
no code implementations • 25 Mar 2023 • Sanbao Su, Songyang Han, Yiming Li, Zhili Zhang, Chen Feng, Caiwen Ding, Fei Miao
MOT-CUP demonstrates the importance of uncertainty quantification in both COD and MOT, and provides the first attempt to improve the accuracy and reduce the uncertainty in MOT based on COD through uncertainty propagation.
1 code implementation • ICCV 2023 • Yiming Li, Qi Fang, Jiamu Bai, Siheng Chen, Felix Juefei-Xu, Chen Feng
This leads to our hypothesize-and-verify framework: perception results with and without collaboration from a random subset of teammates are compared until reaching a consensus.
1 code implementation • 24 Feb 2023 • Najeeb Moharram Jebreel, Josep Domingo-Ferrer, Yiming Li
We find out that the feature difference between benign and poisoned samples tends to be maximum at a critical layer, which is not always the one typically used in existing defenses, namely the layer before fully-connected layers.
1 code implementation • CVPR 2023 • Yiming Li, Zhiding Yu, Christopher Choy, Chaowei Xiao, Jose M. Alvarez, Sanja Fidler, Chen Feng, Anima Anandkumar
To enable such capability in AI systems, we propose VoxFormer, a Transformer-based semantic scene completion framework that can output complete 3D volumetric semantics from only 2D images.
3D geometry 3D Semantic Scene Completion from a single RGB image +1
1 code implementation • ICLR 2023 • Xiangyu Qi, Tinghao Xie, Tinghao_Xie1, Yiming Li, Saeed Mahloujifar, Prateek Mittal
This latent separation is so pervasive that a family of backdoor defenses directly take it as a default assumption (dubbed latent separability assumption), based on which to identify poison samples via cluster analysis in the latent space.
1 code implementation • 1 Feb 2023 • Yiming Li, Mengxi Ya, Yang Bai, Yong Jiang, Shu-Tao Xia
Third-party resources ($e. g.$, samples, backbones, and pre-trained models) are usually involved in the training of deep neural networks (DNNs), which brings backdoor attacks as a new training-phase threat.
no code implementations • 19 Dec 2022 • Yiming Li, Yuan Luo
Aging is a multifactorial process and a key factor of morbidity and mortality.
1 code implementation • CVPR 2023 • Chao Chen, Xinhao Liu, Yiming Li, Li Ding, Chen Feng
LiDAR mapping is important yet challenging in self-driving and mobile robotics.
1 code implementation • ICCV 2023 • Bowen Li, Ziyuan Huang, Junjie Ye, Yiming Li, Sebastian Scherer, Hang Zhao, Changhong Fu
Visual object tracking is essential to intelligent robots.
1 code implementation • 2 Nov 2022 • Sheng Yang, Yiming Li, Yong Jiang, Shu-Tao Xia
Recent studies have demonstrated that deep neural networks (DNNs) are vulnerable to backdoor attacks during the training process.
no code implementations • 2 Nov 2022 • Tong Xu, Yiming Li, Yong Jiang, Shu-Tao Xia
The backdoor adversaries intend to maliciously control the predictions of attacked DNNs by injecting hidden backdoors that can be activated by adversary-specified trigger patterns during the training process.
1 code implementation • 2 Nov 2022 • Chengxiao Luo, Yiming Li, Yong Jiang, Shu-Tao Xia
The backdoored model has promising performance in predicting benign samples, whereas its predictions can be maliciously manipulated by adversaries based on activating its backdoors with pre-defined trigger patterns.
1 code implementation • 18 Oct 2022 • Yiming Li, Zhifang Guo, Zhirong Ye, Xiangdong Wang, Hong Liu, Yueliang Qian, Rui Tao, Long Yan, Kazushige Ouchi
For the frame-wise model, the ICT-TOSHIBA system of DCASE 2021 Task 4 is used.
1 code implementation • 27 Sep 2022 • Yiming Li, Yang Bai, Yong Jiang, Yong Yang, Shu-Tao Xia, Bo Li
In this paper, we revisit dataset ownership verification.
1 code implementation • 16 Sep 2022 • Sanbao Su, Yiming Li, Sihong He, Songyang Han, Chen Feng, Caiwen Ding, Fei Miao
Our work is the first to estimate the uncertainty of collaborative object detection.
1 code implementation • 19 Aug 2022 • Chao Chen, Zegang Cheng, Xinhao Liu, Yiming Li, Li Ding, Ruoyu Wang, Chen Feng
Inspired by noisy label learning, we propose a novel self-supervised framework named TF-VPR that uses temporal neighborhoods and learnable feature neighborhoods to discover unknown spatial neighborhoods.
1 code implementation • 7 Aug 2022 • Hongwei Li, Tao Dai, Yiming Li, Xueyi Zou, Shu-Tao Xia
Image representation is critical for many visual tasks.
1 code implementation • 4 Aug 2022 • Yiming Li, Mingyan Zhu, Xue Yang, Yong Jiang, Tao Wei, Shu-Tao Xia
The rapid development of DNNs has benefited from the existence of some high-quality datasets ($e. g.$, ImageNet), which allow researchers and developers to easily verify the performance of their methods.
1 code implementation • 4 Aug 2022 • Yiming Li, Linghui Zhu, Xiaojun Jia, Yang Bai, Yong Jiang, Shu-Tao Xia, Xiaochun Cao
In general, we conduct the ownership verification by verifying whether a suspicious model contains the knowledge of defender-specified external features.
no code implementations • 19 Jul 2022 • Yiming Li, Zhaozhong Chen, Zhouyi Hu, David M. Benton, Abdallah A. I. Ali, Mohammed Patel, Martin P. J. Lavery, Andrew D. Ellis
We experimentally demonstrate the enhanced atmospheric turbulence resiliency in a 137. 8 Gbit/s/mode mode-division multiplexing free-space optical communication link through the application of a successive interference cancellation digital signal processing algorithm.
1 code implementation • 26 May 2022 • Xiangyu Qi, Tinghao Xie, Yiming Li, Saeed Mahloujifar, Prateek Mittal
This latent separation is so pervasive that a family of backdoor defenses directly take it as a default assumption (dubbed latent separability assumption), based on which to identify poison samples via cluster analysis in the latent space.
no code implementations • CVPR 2022 • Yiming Li, Ziang Cao, Andrew Liang, Benjamin Liang, Luoyao Chen, Hang Zhao, Chen Feng
We are interested in anticipating as early as possible the target location of a person's object manipulation action in a 3D workspace from egocentric vision.
no code implementations • 10 Mar 2022 • Dong Wei, Yiming Li, Yinyan Wang, Tianyi Qian, Yefeng Zheng
Methods: A DCNN model was developed for the prediction of the five glioma subtypes based on a hierarchical classification paradigm.
no code implementations • 17 Feb 2022 • Yiming Li, Dekun Ma, Ziyan An, Zixun Wang, Yiqi Zhong, Siheng Chen, Chen Feng
Vehicle-to-everything (V2X) communication techniques enable the collaboration between vehicles and many other entities in the neighboring environment, which could fundamentally improve the perception system for autonomous driving.
2 code implementations • ICLR 2022 • Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren
Recent studies have revealed that deep neural networks (DNNs) are vulnerable to backdoor attacks, where attackers embed hidden backdoors in the DNN model by poisoning a few training samples.
1 code implementation • ICLR 2022 • Yiming Li, Haoxiang Zhong, Xingjun Ma, Yong Jiang, Shu-Tao Xia
Visual object tracking (VOT) has been widely adopted in mission-critical applications, such as autonomous driving and intelligent surveillance systems.
no code implementations • CVPR 2022 • Yiming Li, Xiaoshan Yang, Changsheng Xu
Humans can not only see the collection of objects in visual scenes, but also identify the relationship between objects.
1 code implementation • ICML Workshop AML 2021 • Yiming Li, Linghui Zhu, Xiaojun Jia, Yong Jiang, Shu-Tao Xia, Xiaochun Cao
In this paper, we explore the defense from another angle by verifying whether a suspicious model contains the knowledge of defender-specified \emph{external features}.
no code implementations • 5 Dec 2021 • Yiming Li, Zhouyi Hu, Andrew Ellis
Our numerical results show that the performance of our phase estimation algorithm is close to the proposed CRLB.
no code implementations • 19 Nov 2021 • Yiming Li, Sanjiv J. Shah, Donna Arnett, Ryan Irvin, Yuan Luo
Hypertension is the leading global cause of cardiovascular disease and premature death.
2 code implementations • NeurIPS 2021 • Yiming Li, Shunli Ren, Pengxiang Wu, Siheng Chen, Chen Feng, Wenjun Zhang
Our approach is validated on V2X-Sim 1. 0, a large-scale multi-agent perception dataset that we synthesized using CARLA and SUMO co-simulation.
Ranked #3 on 3D Object Detection on V2X-SIM
1 code implementation • 11 Oct 2021 • Kongming Liang, Kai Han, Xiuli Li, Xiaoqing Cheng, Yiming Li, Yizhou Wang, Yizhou Yu
In this paper, we propose a symmetry enhanced attention network (SEAN) for acute ischemic infarct segmentation.
no code implementations • 2 Sep 2021 • Chuanbiao Song, Yanbo Fan, Yichen Yang, Baoyuan Wu, Yiming Li, Zhifeng Li, Kun He
Adversarial training (AT) has been demonstrated as one of the most promising defense methods against various adversarial attacks.
no code implementations • 5 Aug 2021 • Yiming Li, Tao Kong, Ruihang Chu, Yifeng Li, Peng Wang, Lei LI
In a unified framework, we jointly predict the feasible 6-DoF grasp poses, instance semantic segmentation, and collision information.
1 code implementation • ICCV 2021 • Ziang Cao, Changhong Fu, Junjie Ye, Bowen Li, Yiming Li
Most existing Siamese-based tracking methods execute the classification and regression of the target object based on the similarity maps.
no code implementations • 12 Jul 2021 • Yiming Li, Chao GAO, Mark S. Leeson, Xiaofeng Li
This paper investigates the asymptotic BER performance of coherent optical wireless communication systems in Gamma-Gamma turbulence when applying the V-BLAST MIMO scheme.
1 code implementation • 16 Jun 2021 • Ziang Cao, Changhong Fu, Junjie Ye, Bowen Li, Yiming Li
By virtue of the attention mechanism, we conduct a special attentional aggregation network (AAN) consisting of self-AAN and cross-AAN for raising the representation ability of features eventually.
no code implementations • 6 Apr 2021 • Yiming Li, Tongqing Zhai, Yong Jiang, Zhifeng Li, Shu-Tao Xia
We demonstrate that this attack paradigm is vulnerable when the trigger in testing images is not consistent with the one used for training.
1 code implementation • ICCV 2021 • Yiming Li, Congcong Wen, Felix Juefei-Xu, Chen Feng
LiDAR point clouds collected from a moving vehicle are functions of its trajectories, because the sensor motion needs to be compensated to avoid distortions.
2 code implementations • 8 Mar 2021 • Bowen Li, Yiming Li, Junjie Ye, Changhong Fu, Hang Zhao
As a crucial robotic perception capability, visual tracking has been intensively studied recently.
no code implementations • 6 Mar 2021 • Yiming Li, YanJie Li, Yalei Lv, Yong Jiang, Shu-Tao Xia
Deep neural networks (DNNs) are vulnerable to the \emph{backdoor attack}, which intends to embed hidden backdoors in DNNs by poisoning training data.
no code implementations • 5 Mar 2021 • Yiming Li, Shan Liu, Yu Chen, Yushan Zheng, Sijia Chen, Bin Zhu, Jian Lou
As the successor of H. 265/HEVC, the new versatile video coding standard (H. 266/VVC) can provide up to 50% bitrate saving with the same subjective quality, at the cost of increased decoding complexity.
2 code implementations • ICLR 2021 • Jiawang Bai, Baoyuan Wu, Yong Zhang, Yiming Li, Zhifeng Li, Shu-Tao Xia
By utilizing the latest technique in integer programming, we equivalently reformulate this BIP problem as a continuous optimization problem, which can be effectively and efficiently solved using the alternating direction method of multipliers (ADMM) method.
no code implementations • 18 Jan 2021 • Jiale Zhao, Zijing Zhang, Yiming Li, Longzhu Cen, Yuan Zhao
Recognition of OAM modes unlimited by distance and sign of TC achieved by MIADLFR method can make optical communication and detection by OAM light much more attractive.
Optics Image and Video Processing Medical Physics
1 code implementation • 19 Dec 2020 • Changhong Fu, Ziang Cao, Yiming Li, Junjie Ye, Chen Feng
In the domain of visual tracking, most deep learning-based trackers highlight the accuracy but casting aside efficiency.
1 code implementation • 22 Oct 2020 • Tongqing Zhai, Yiming Li, Ziqi Zhang, Baoyuan Wu, Yong Jiang, Shu-Tao Xia
We also demonstrate that existing backdoor attacks cannot be directly adopted in attacking speaker verification.
2 code implementations • 12 Oct 2020 • Yiming Li, Ziqi Zhang, Jiawang Bai, Baoyuan Wu, Yong Jiang, Shu-Tao Xia
Based on the proposed backdoor-based watermarking, we use a hypothesis test guided method for dataset verification based on the posterior probability generated by the suspicious third-party model of the benign samples and their correspondingly watermarked samples ($i. e.$, images with trigger) on the target class.
1 code implementation • 11 Sep 2020 • Siyue Xie, Yiming Li, Da Sun Handason Tam, Xiaxin Liu, Qiu Fang Ying, Wing Cheong Lau, Dah Ming Chiu, Shou Zhi Chen
In this paper, we propose the Graph Temporal Edge Aggregation (GTEA) framework for inductive learning on Temporal Interaction Graphs (TIGs).
no code implementations • 21 Aug 2020 • Yiming Li, Jiawang Bai, Jiawei Li, Xue Yang, Yong Jiang, Shu-Tao Xia
Interpretability and effectiveness are two essential and indispensable requirements for adopting machine learning methods in reality.
1 code implementation • 10 Aug 2020 • Changhong Fu, Fangqiang Ding, Yiming Li, Jin Jin, Chen Feng
By repressing the response of distractors in the regressor learning, we can dynamically and adaptively alter our regression target to leverage the tracking robustness as well as adaptivity.
1 code implementation • 10 Aug 2020 • Fangqiang Ding, Changhong Fu, Yiming Li, Jin Jin, Chen Feng
Current unmanned aerial vehicle (UAV) visual tracking algorithms are primarily limited with respect to: (i) the kind of size variation they can deal with, (ii) the implementation speed which hardly meets the real-time requirement.
1 code implementation • 2 Aug 2020 • Yujie He, Changhong Fu, Fuling Lin, Yiming Li, Peng Lu
Object tracking has been broadly applied in unmanned aerial vehicle (UAV) tasks in recent years.
1 code implementation • 17 Jul 2020 • Yiming Li, Yong Jiang, Zhifeng Li, Shu-Tao Xia
Backdoor attack intends to embed hidden backdoor into deep neural networks (DNNs), so that the attacked models perform well on benign samples, whereas their predictions will be maliciously changed if the hidden backdoor is activated by attacker-specified triggers.
1 code implementation • 10 Jul 2020 • Shen Wang, Kongming Liang, Yiming Li, Yizhou Yu, Yizhou Wang
Nevertheless, there are still great challenges with brain midline delineation, such as the largely deformed midline caused by the mass effect and the possible morphological failure that the predicted midline is not a connected curve.
2 code implementations • ECCV 2020 • Jiawang Bai, Bin Chen, Yiming Li, Dongxian Wu, Weiwei Guo, Shu-Tao Xia, En-hui Yang
In this paper, we propose a novel method, dubbed deep hashing targeted attack (DHTA), to study the targeted attack on such retrieval.
no code implementations • 9 Apr 2020 • Yiming Li, Tongqing Zhai, Baoyuan Wu, Yong Jiang, Zhifeng Li, Shu-Tao Xia
Backdoor attack intends to inject hidden backdoor into the deep neural networks (DNNs), such that the prediction of the infected model will be maliciously changed if the hidden backdoor is activated by the attacker-defined trigger, while it performs well on benign samples.
1 code implementation • CVPR 2020 • Yiming Li, Changhong Fu, Fangqiang Ding, Ziyuan Huang, Geng Lu
Considerable tests in the indoor practical scenarios have proven the effectiveness and versatility of our localization method.
1 code implementation • 16 Mar 2020 • Yiming Li, Baoyuan Wu, Yan Feng, Yanbo Fan, Yong Jiang, Zhifeng Li, Shu-Tao Xia
In this work, we propose a novel defense method, the robust training (RT), by jointly minimizing two separated risks ($R_{stand}$ and $R_{rob}$), which is with respect to the benign example and its neighborhoods respectively.
1 code implementation • 11 Mar 2020 • Fan Li, Changhong Fu, Fuling Lin, Yiming Li, Peng Lu
After the establishment of a new slot, the weighted fusion of the previous samples generates one key-sample, in order to reduce the number of samples to be scored.
1 code implementation • 11 Mar 2020 • Yiming Li, Changhong Fu, Ziyuan Huang, Yinqiang Zhang, Jia Pan
Correlation filter-based tracking has been widely applied in unmanned aerial vehicle (UAV) with high efficiency.
no code implementations • 23 Nov 2019 • Chaowei Fang, Guanbin Li, Chengwei Pan, Yiming Li, Yizhou Yu
Recently 3D volumetric organ segmentation attracts much research interest in medical image analysis due to its significance in computer aided diagnosis.
1 code implementation • 5 Nov 2019 • Yiming Li, Peidong Liu, Yong Jiang, Shu-Tao Xia
To a large extent, the privacy of visual classification data is mainly in the mapping between the image and its corresponding label, since this relation provides a great amount of information and can be used in other scenarios.
no code implementations • 27 Oct 2019 • Jia Xu, Yiming Li, Yong Jiang, Shu-Tao Xia
In this paper, we define the local flatness of the loss surface as the maximum value of the chosen norm of the gradient regarding to the input within a neighborhood centered on the benign sample, and discuss the relationship between the local flatness and adversarial vulnerability.
1 code implementation • 24 Sep 2019 • Yiming Li, Changhong Fu, Fangqiang Ding, Ziyuan Huang, Jia Pan
The outstanding computational efficiency of discriminative correlation filter (DCF) fades away with various complicated improvements.
1 code implementation • 10 Aug 2019 • Changhong Fu, Ziyuan Huang, Yiming Li, Ran Duan, Peng Lu
Meanwhile, convolutional features are extracted to provide a more comprehensive representation of the object.
1 code implementation • ICCV 2019 • Ziyuan Huang, Changhong Fu, Yiming Li, Fuling Lin, Peng Lu
Traditional framework of discriminative correlation filters (DCF) is often subject to undesired boundary effects.
1 code implementation • 17 Jul 2019 • Yiming Li, Yang Zhang, Qingtao Tang, Weipeng Huang, Yong Jiang, Shu-Tao Xia
$k$-means algorithm is one of the most classical clustering methods, which has been widely and successfully used in signal processing.
no code implementations • 14 Mar 2019 • Jiawang Bai, Yiming Li, Jiawei Li, Yong Jiang, Shu-Tao Xia
How to obtain a model with good interpretability and performance has always been an important research topic.
no code implementations • 10 Mar 2019 • Yiming Li, Jiawang Bai, Jiawei Li, Xue Yang, Yong Jiang, Chun Li, Shu-Tao Xia
Despite the impressive performance of random forests (RF), its theoretical properties have not been thoroughly understood.
1 code implementation • 4 Mar 2019 • Wenhui Cui, Yanlin Liu, Yuxing Li, Menghao Guo, Yiming Li, Xiuli Li, Tianle Wang, Xiangzhu Zeng, Chuyang Ye
Since unannotated data is generally abundant, it is desirable to use unannotated data to improve the segmentation performance for CNNs when limited annotated data is available.