no code implementations • 18 Jan 2024 • Jun Wang, Chengfeng Zhou, Zhaoyan Ming, Lina Wei, Xudong Jiang, Dahong Qian
One of the fundamental challenges in microscopy (MS) image analysis is instance segmentation (IS), particularly when segmenting cluster regions where multiple objects of varying sizes and shapes may be connected or even overlapped in arbitrary orientations.
no code implementations • 24 Dec 2021 • Haibo Jin, Ruoxi Chen, Jinyin Chen, Yao Cheng, Chong Fu, Ting Wang, Yue Yu, Zhaoyan Ming
Existing DNN testing methods are mainly designed to find incorrect corner case behaviors in adversarial settings but fail to discover the backdoors crafted by strong trojan attacks.
no code implementations • 1 Dec 2021 • Liyuan Ma, Kejie Huang, Dongxu Wei, Zhaoyan Ming, Haibin Shen
Human pose transfer aims at transferring the appearance of the source person to the target pose.
1 code implementation • 14 May 2021 • Jinyin Chen, Ruoxi Chen, Haibin Zheng, Zhaoyan Ming, Wenrong Jiang, Chen Cui
Motivated by the observation that adversarial examples are due to the non-robust feature learned from the original dataset by models, we propose the concepts of salient feature(SF) and trivial feature(TF).
1 code implementation • 18 Jan 2021 • Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Kejie Huang, Wenrong Jiang, Chen Cui
To address this problem, we propose GraphAttacker, a novel generic graph attack framework that can flexibly adjust the structures and the attack strategies according to the graph analysis tasks.
no code implementations • 6 Jan 2021 • Jinyin Chen, Longyuan Zhang, Haibin Zheng, Xueke Wang, Zhaoyan Ming
As existing episodes mainly focused on attack success rate with patch-based samples, defense algorithms can easily detect these poisoning samples.
no code implementations • 18 Dec 2020 • Jinyin Chen, Zhen Wang, Haibin Zheng, Jun Xiao, Zhaoyan Ming
This work proposes a generic evaluation metric ROBY, a novel attack-independent robustness measure based on the model's decision boundaries.