no code implementations • 18 Aug 2023 • Jin Liu, Xiaokang Pan, Junwen Duan, Hongdong Li, Youqi Li, Zhe Qu
All the proposed complexities indicate that our proposed methods can match lower bounds to existing minimax optimizations, without requiring a large batch size in each iteration.
no code implementations • 30 May 2023 • Yifu Zhang, Hongru Li, Shimeng Shi, Youqi Li, Jiansong Zhang
In order to ensure that the data from the target domain in different sub-networks in the same batch is exactly the same, we designed a multi-source domain independent strategy to provide the possibility for later local feature fusion to complete the key features required.
1 code implementation • 5 Apr 2023 • Wenjie Qu, Youqi Li, Binghui Wang
We are the first, from the attacker perspective, to leverage the properties of certified radius and propose a certified radius guided attack framework against image segmentation models.
1 code implementation • CVPR 2022 • Binghui Wang, Youqi Li, Pan Zhou
We then propose an online attack based on bandit optimization which is proven to be {sublinear} to the query number $T$, i. e., $\mathcal{O}(\sqrt{N}T^{3/4})$ where $N$ is the number of nodes in the graph.
no code implementations • 29 Sep 2021 • Binghui Wang, Youqi Li, Pan Zhou
However, many recent works have demonstrated that an attacker can mislead GNN models by slightly perturbing the graph structure.