Search Results for author: Zhihong Tian

Found 12 papers, 3 papers with code

Mitigating Hallucinations in Large Vision-Language Models by Adaptively Constraining Information Flow

1 code implementation28 Feb 2025 Jiaqi Bai, Hongcheng Guo, Zhongyuan Peng, Jian Yang, Zhoujun Li, Mohan Li, Zhihong Tian

Furthermore, we propose an entropy-based noise-controlling strategy to enable the injected noise to be adaptively constrained regarding the smoothness of the similarity distribution.

Hallucination Object +3

Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks

1 code implementation16 Jan 2025 Yixiao Xu, Binxing Fang, Rui Wang, Yinghai Zhou, YuAn Liu, Mohan Li, Zhihong Tian

Guided by the model, we further introduce: (1) a similarity-based training-free watermarking method for plug-and-play and flexible watermarking, and (2) a distribution-based multi-step watermark information transmission strategy for robust watermarking.

Model extraction

Imperceptible Adversarial Attacks on Point Clouds Guided by Point-to-Surface Field

no code implementations26 Dec 2024 Keke Tang, Weiyao Ke, Weilong Peng, Xiaofei Wang, Ziyong Du, Zhize Wu, Peican Zhu, Zhihong Tian

In this paper, we attribute the inadequate imperceptibility of adversarial attacks on point clouds to deviations from the underlying surface.

Adversarial Robustness Attribute +1

CORES: Convolutional Response-based Score for Out-of-distribution Detection

no code implementations CVPR 2024 Keke Tang, Chao Hou, Weilong Peng, Runnan Chen, Peican Zhu, Wenping Wang, Zhihong Tian

Deep neural networks (DNNs) often display overconfidence when encountering out-of-distribution (OOD) samples posing significant challenges in real-world applications.

Out-of-Distribution Detection

PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks

no code implementations6 Oct 2021 Lei Zhang, Shuaimin Jiang, Xiajiong Shen, Brij B. Gupta, Zhihong Tian

To address this imbalance, an intrusion detection system called pretraining Wasserstein generative adversarial network intrusion detection system (PWG-IDS) is proposed in this paper.

Generative Adversarial Network Network Intrusion Detection

Stabilized Likelihood-based Imitation Learning via Denoising Continuous Normalizing Flow

no code implementations29 Sep 2021 Xin Zhang, Yanhua Li, Ziming Zhang, Christopher Brinton, Zhenming Liu, Zhi-Li Zhang, Hui Lu, Zhihong Tian

State-of-the-art imitation learning (IL) approaches, e. g, GAIL, apply adversarial training to minimize the discrepancy between expert and learner behaviors, which is prone to unstable training and mode collapse.

Denoising Imitation Learning

TREATED:Towards Universal Defense against Textual Adversarial Attacks

no code implementations13 Sep 2021 Bin Zhu, Zhaoquan Gu, Le Wang, Zhihong Tian

Recent work shows that deep neural networks are vulnerable to adversarial examples.

Adversarial Defense

Mask is All You Need: Rethinking Mask R-CNN for Dense and Arbitrary-Shaped Scene Text Detection

no code implementations8 Sep 2021 Xugong Qin, Yu Zhou, Youhui Guo, Dayan Wu, Zhihong Tian, Ning Jiang, Hongbin Wang, Weiping Wang

We propose to use an MLP decoder instead of the "deconv-conv" decoder in the mask head, which alleviates the issue and promotes robustness significantly.

All Decoder +6

Decision Propagation Networks for Image Classification

no code implementations27 Nov 2019 Keke Tang, Peng Song, Yuexin Ma, Zhaoquan Gu, Yu Su, Zhihong Tian, Wenping Wang

High-level (e. g., semantic) features encoded in the latter layers of convolutional neural networks are extensively exploited for image classification, leaving low-level (e. g., color) features in the early layers underexplored.

Classification General Classification +2

Cannot find the paper you are looking for? You can Submit a new open access paper.