关注
Jiawang Bai
Jiawang Bai
在 mails.tsinghua.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Targeted attack for deep hashing based retrieval
J Bai, B Chen, Y Li, D Wu, W Guo, S Xia, E Yang
European Conference on Computer Vision (Oral), 618-634, 2020
932020
Improving Vision Transformers by Revisiting High-frequency Components
J Bai, L Yuan, ST Xia, S Yan, Z Li, W Liu
European Conference on Computer Vision, 2022, 2022
872022
Multinomial Random Forest
J Bai, Y Li, J Li, X Yang, Y Jiang, ST Xia
Pattern Recognition, 108331, 2021
772021
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
J Bai, B Wu, Y Zhang, Y Li, Z Li, ST Xia
International Conference on Learning Representations, 2021
772021
Open-sourced Dataset Protection via Backdoor Watermarking
Y Li, Z Zhang, J Bai, B Wu, Y Jiang, ST Xia
NeurIPS 2020 Workshop on Dataset Curation and Security, 2020
552020
GraphAdapter: Tuning Vision-Language Models With Dual Knowledge Graph
X Li, D Lian, Z Lu, J Bai, Z Chen, X Wang
NeurIPS 2023, 2023
472023
Can SAM Boost Video Super-Resolution?
Z Lu, Z Xiao, J Bai, Z Xiong, X Wang
arXiv preprint arXiv:2305.06524, 2023
322023
Imperceptible and Robust Backdoor Attack in 3D Point Cloud
K Gao*, J Bai*, B Wu, M Ya, ST Xia
Transactions on Information Forensics and Security (TIFS), 2022
312022
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
J Bai, K Gao, D Gong, ST Xia, Z Li, W Liu
European Conference on Computer Vision, 2022, 2022
312022
Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval
B Chen, Y Feng, T Dai, J Bai, Y Jiang, ST Xia, X Wang
IEEE Transactions on Pattern Analysis & Machine Intelligence, 1-1, 2022
222022
Rectified Decision Trees: Exploring the Landscape of Interpretable and Effective Machine Learning
Y Li, J Bai, J Li, X Yang, Y Jiang, ST Xia
arXiv preprint arXiv:2008.09413, 2020
20*2020
BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP
J Bai, K Gao, S Min, ST Xia, Z Li, W Liu
CVPR 2024, 2024
192024
A Dive into SAM Prior in Image Restoration
Z Xiao, J Bai, Z Lu, Z Xiong
arXiv preprint arXiv:2305.13620, 2023
172023
Versatile Weight Attack via Flipping Limited Bits
J Bai, B Wu, Z Li, S Xia
Transactions on Pattern Analysis and Machine Intelligence (T-PAMI), 2023
122023
Adversarial robustness for visual grounding of multimodal large language models
K Gao, Y Bai, J Bai, Y Yang, ST Xia
ICLR workshop, 2024
102024
Not all prompts are secure: A switchable backdoor attack against pre-trained vision transfomers
S Yang, J Bai, K Gao, Y Yang, Y Li, ST Xia
CVPR 2024, 24431-24441, 2024
82024
Beyond Sole Strength: Customized Ensembles for Generalized Vision-Language Models
Z Lu, J Bai, X Li, Z Xiao, X Wang
ICML 2024, 2024
82024
Clean-label Backdoor Attack against Deep Hashing based Retrieval
K Gao*, J Bai*, B Chen, D Wu, ST Xia
BMVC, 2023
52023
Practical Protection against Video Data Leakage via Universal Adversarial Head
J Bai, B Chen, K Gao, X Wang, ST Xia
Pattern Recognition, 2022
52022
Universal Adversarial Head: Practical Protection against Video Data Leakage
J Bai, B Chen, D Wu, C Zhang, ST Xia
ICML 2021 Workshop on Adversarial Machine Learning, 2021
52021
系统目前无法执行此操作,请稍后再试。
文章 1–20