1 code implementation • 2 Feb 2024 • Dingcheng Yang, Yang Bai, Xiaojun Jia, Yang Liu, Xiaochun Cao, Wenjian Yu
The MMP-Attack shows a notable advantage over existing works with superior universality and transferability, which can effectively attack commercial text-to-image (T2I) models such as DALL-E 3.
2 code implementations • 14 Apr 2023 • Dingcheng Yang, Wenjian Yu, Zihao Xiao, Jiaqi Luo
In this paper, we propose to improve the transferability of adversarial examples in the transfer-based attack via masking unimportant parameters (MUP).
2 code implementations • 16 Jun 2022 • Dingcheng Yang, Zihao Xiao, Wenjian Yu
This paper proposes a method for training a surrogate model with dark knowledge to boost the transferability of the adversarial examples generated by the surrogate model.
1 code implementation • 14 Jul 2021 • Dingcheng Yang, Wenjian Yu, Yuanbo Guo, Wenjie Liang
Accurate capacitance extraction is becoming more important for designing integrated circuits under advanced process technology.
2 code implementations • 8 Jul 2020 • Xiao Yang, Dingcheng Yang, Yinpeng Dong, Hang Su, Wenjian Yu, Jun Zhu
Based on large-scale evaluations, the commercial FR API services fail to exhibit acceptable performance on robustness evaluation, and we also draw several important conclusions for understanding the adversarial robustness of FR models and providing insights for the design of robust FR models.
no code implementations • 21 Mar 2020 • Dingcheng Yang, Wenjian Yu, Ao Zhou, Haoyuan Mu, Gary Yao, Xiaoyi Wang
In this work, we propose an effective scheme (called DP-Net) for compressing the deep neural networks (DNNs).
6 code implementations • CVPR 2019 • Song-Hai Zhang, Rui-Long Li, Xin Dong, Paul L. Rosin, Zixi Cai, Han Xi, Dingcheng Yang, Hao-Zhi Huang, Shi-Min Hu
We demonstrate that our pose-based framework can achieve better accuracy than the state-of-art detection-based approach on the human instance segmentation problem, and can moreover better handle occlusion.
Ranked #1 on Human Instance Segmentation on OCHuman