no code implementations • 5 Feb 2024 • Yang Sui, Huy Phan, Jinqi Xiao, Tianfang Zhang, Zijie Tang, Cong Shi, Yan Wang, Yingying Chen, Bo Yuan
In this paper, for the first time, we systematically explore the detectability of the poisoned noise input for the backdoored diffusion models, an important performance metric yet little explored in the existing works.
no code implementations • 19 Jan 2024 • Leon Frischauf, Otmar Scherzer, Cong Shi
Neural network with quadratic decision functions have been introduced as alternatives to standard neural networks with affine linear one.
1 code implementation • ICCV 2023 • Qiufan Ji, Lin Wang, Cong Shi, Shengshan Hu, Yingying Chen, Lichao Sun
In this paper, we first establish a comprehensive, and rigorous point cloud adversarial robustness benchmark to evaluate adversarial robustness, which can provide a detailed understanding of the effects of the defense and attack methods.
no code implementations • 24 Feb 2023 • Rui Miao, Zhengling Qi, Cong Shi, Lin Lin
Specifically, relying on the structural models of revenue and price, we establish the identifiability condition of an optimal pricing strategy under endogeneity with the help of invalid instrumental variables.
no code implementations • 8 Feb 2023 • Juncheng Dong, Weibin Mo, Zhengling Qi, Cong Shi, Ethan X. Fang, Vahid Tarokh
The objective is to use the offline dataset to find an optimal assortment.
1 code implementation • 22 Aug 2022 • Huy Phan, Cong Shi, Yi Xie, Tianfang Zhang, Zhuohang Li, Tianming Zhao, Jian Liu, Yan Wang, Yingying Chen, Bo Yuan
Recently backdoor attack has become an emerging threat to the security of deep neural network (DNN) models.
no code implementations • 15 Oct 2021 • Zhaoyi Xu, Cong Shi, Tianfang Zhang, ShuPing Li, Yichao Yuan, Chung-Tse Michael Wu, Yingying Chen, Athina Petropulu
Based on the designed TDM phased-MIMO radar, we develop a system to automatically localize multiple human subjects and estimate their vital signs.
1 code implementation • ICML 2020 • Xichuan Zhou, Yicong Peng, Chunqiao Long, Fengbo Ren, Cong Shi
Monocular multi-object detection and localization in 3D space has been proven to be a challenging task.
1 code implementation • 9 Jun 2020 • Xichuan Zhou, Kui Liu, Cong Shi, Haijun Liu, Ji Liu
Recent researches on information bottleneck shed new light on the continuous attempts to open the black box of neural signal encoding.
no code implementations • 26 Apr 2020 • Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan
These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).
no code implementations • 4 Mar 2020 • Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan
As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.