Search Results for author: Zhaoyan Ming

Found 7 papers, 2 papers with code

Skeleton-Guided Instance Separation for Fine-Grained Segmentation in Microscopy

no code implementations18 Jan 2024 Jun Wang, Chengfeng Zhou, Zhaoyan Ming, Lina Wei, Xudong Jiang, Dahong Qian

One of the fundamental challenges in microscopy (MS) image analysis is instance segmentation (IS), particularly when segmenting cluster regions where multiple objects of varying sizes and shapes may be connected or even overlapped in arbitrary orientations.

Instance Segmentation Semantic Segmentation

CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing

no code implementations24 Dec 2021 Haibo Jin, Ruoxi Chen, Jinyin Chen, Yao Cheng, Chong Fu, Ting Wang, Yue Yu, Zhaoyan Ming

Existing DNN testing methods are mainly designed to find incorrect corner case behaviors in adversarial settings but fail to discover the backdoors crafted by strong trojan attacks.

DNN Testing

FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer

no code implementations1 Dec 2021 Liyuan Ma, Kejie Huang, Dongxu Wei, Zhaoyan Ming, Haibin Shen

Human pose transfer aims at transferring the appearance of the source person to the target pose.

Pose Transfer

Salient Feature Extractor for Adversarial Defense on Deep Neural Networks

1 code implementation14 May 2021 Jinyin Chen, Ruoxi Chen, Haibin Zheng, Zhaoyan Ming, Wenrong Jiang, Chen Cui

Motivated by the observation that adversarial examples are due to the non-robust feature learned from the original dataset by models, we propose the concepts of salient feature(SF) and trivial feature(TF).

Adversarial Defense Generative Adversarial Network

GraphAttacker: A General Multi-Task GraphAttack Framework

1 code implementation18 Jan 2021 Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Kejie Huang, Wenrong Jiang, Chen Cui

To address this problem, we propose GraphAttacker, a novel generic graph attack framework that can flexibly adjust the structures and the attack strategies according to the graph analysis tasks.

General Classification Generative Adversarial Network +3

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack

no code implementations6 Jan 2021 Jinyin Chen, Longyuan Zhang, Haibin Zheng, Xueke Wang, Zhaoyan Ming

As existing episodes mainly focused on attack success rate with patch-based samples, defense algorithms can easily detect these poisoning samples.

ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries

no code implementations18 Dec 2020 Jinyin Chen, Zhen Wang, Haibin Zheng, Jun Xiao, Zhaoyan Ming

This work proposes a generic evaluation metric ROBY, a novel attack-independent robustness measure based on the model's decision boundaries.

Cannot find the paper you are looking for? You can Submit a new open access paper.