Search Results for author: Yingying Chen

Found 13 papers, 3 papers with code

Blended Grammar Network for Human Parsing

no code implementations ECCV 2020 Xiaomei Zhang, Yingying Chen, Bingke Zhu, Jinqiao Wang, Ming Tang

Although human parsing has made great progress, it still faces a challenge, i. e., how to extract the whole foreground from similar or cluttered scenes effectively.

Hierarchical structure Human Parsing

Occlusion-Aware Siamese Network for Human Pose Estimation

no code implementations ECCV 2020 Lu Zhou, Yingying Chen, Yunze Gao, Jinqiao Wang, Hanqing Lu

To overcome the defects caused by the erasing operation, we perform feature reconstruction to recover the information destroyed by occlusion and details lost in cleaning procedure.

Pose Estimation

Simultaneous Monitoring of Multiple People's Vital Sign Leveraging a Single Phased-MIMO Radar

no code implementations15 Oct 2021 Zhaoyi Xu, Cong Shi, Tianfang Zhang, ShuPing Li, Yichao Yuan, Chung-Tse Michael Wu, Yingying Chen, Athina Petropulu

Based on the designed TDM phased-MIMO radar, we develop a system to automatically localize multiple human subjects and estimate their vital signs.

Improving Multiple Object Tracking With Single Object Tracking

no code implementations CVPR 2021 Linyu Zheng, Ming Tang, Yingying Chen, Guibo Zhu, Jinqiao Wang, Hanqing Lu

Despite considerable similarities between multiple object tracking (MOT) and single object tracking (SOT) tasks, modern MOT methods have not benefited from the development of SOT ones to achieve satisfactory performance.

Multiple Object Tracking Object Detection

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model

no code implementations26 Apr 2020 Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan

These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).

Adversarial Attack

Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems

no code implementations4 Mar 2020 Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan

As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.

Adversarial Attack Speaker Recognition

Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers

1 code implementation12 Jul 2019 S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen

In this paper, we build a speech privacy attack that exploits speech reverberations generated from a smartphone's inbuilt loudspeaker captured via a zero-permission motion sensor (accelerometer).

Cryptography and Security

Learning Feature Embeddings for Discriminant Model based Tracking

no code implementations ECCV 2020 Linyu Zheng, Ming Tang, Yingying Chen, Jinqiao Wang, Hanqing Lu

After observing that the features used in most online discriminatively trained trackers are not optimal, in this paper, we propose a novel and effective architecture to learn optimal feature embeddings for online discriminative tracking.

Visual Tracking

BDD100K: A Diverse Driving Dataset for Heterogeneous Multitask Learning

2 code implementations CVPR 2020 Fisher Yu, Haofeng Chen, Xin Wang, Wenqi Xian, Yingying Chen, Fangchen Liu, Vashisht Madhavan, Trevor Darrell

Datasets drive vision progress, yet existing driving datasets are impoverished in terms of visual content and supported tasks to study multitask learning for autonomous driving.

2D Object Detection Autonomous Driving +8

Fast Deep Matting for Portrait Animation on Mobile Phone

1 code implementation26 Jul 2017 Bingke Zhu, Yingying Chen, Jinqiao Wang, Si Liu, Bo Zhang, Ming Tang

Finally, an automatic portrait animation system based on fast deep matting is built on mobile devices, which does not need any interaction and can realize real-time matting with 15 fps.

Image Matting Video Editing

Joint Background Reconstruction and Foreground Segmentation via A Two-stage Convolutional Neural Network

no code implementations24 Jul 2017 Xu Zhao, Yingying Chen, Ming Tang, Jinqiao Wang

In the first stage, a convolutional encoder-decoder sub-network is employed to reconstruct the background images and encode rich prior knowledge of background scenes.

Cannot find the paper you are looking for? You can Submit a new open access paper.