Targeted attack for deep hashing based retrieval J Bai, B Chen, Y Li, D Wu, W Guo, S Xia, E Yang European Conference on Computer Vision (Oral), 618-634, 2020 | 93 | 2020 |
Improving Vision Transformers by Revisiting High-frequency Components J Bai, L Yuan, ST Xia, S Yan, Z Li, W Liu European Conference on Computer Vision, 2022, 2022 | 87 | 2022 |
Multinomial Random Forest J Bai, Y Li, J Li, X Yang, Y Jiang, ST Xia Pattern Recognition, 108331, 2021 | 77 | 2021 |
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits J Bai, B Wu, Y Zhang, Y Li, Z Li, ST Xia International Conference on Learning Representations, 2021 | 77 | 2021 |
Open-sourced Dataset Protection via Backdoor Watermarking Y Li, Z Zhang, J Bai, B Wu, Y Jiang, ST Xia NeurIPS 2020 Workshop on Dataset Curation and Security, 2020 | 55 | 2020 |
GraphAdapter: Tuning Vision-Language Models With Dual Knowledge Graph X Li, D Lian, Z Lu, J Bai, Z Chen, X Wang NeurIPS 2023, 2023 | 47 | 2023 |
Can SAM Boost Video Super-Resolution? Z Lu, Z Xiao, J Bai, Z Xiong, X Wang arXiv preprint arXiv:2305.06524, 2023 | 32 | 2023 |
Imperceptible and Robust Backdoor Attack in 3D Point Cloud K Gao*, J Bai*, B Wu, M Ya, ST Xia Transactions on Information Forensics and Security (TIFS), 2022 | 31 | 2022 |
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips J Bai, K Gao, D Gong, ST Xia, Z Li, W Liu European Conference on Computer Vision, 2022, 2022 | 31 | 2022 |
Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval B Chen, Y Feng, T Dai, J Bai, Y Jiang, ST Xia, X Wang IEEE Transactions on Pattern Analysis & Machine Intelligence, 1-1, 2022 | 22 | 2022 |
Rectified Decision Trees: Exploring the Landscape of Interpretable and Effective Machine Learning Y Li, J Bai, J Li, X Yang, Y Jiang, ST Xia arXiv preprint arXiv:2008.09413, 2020 | 20* | 2020 |
BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP J Bai, K Gao, S Min, ST Xia, Z Li, W Liu CVPR 2024, 2024 | 19 | 2024 |
A Dive into SAM Prior in Image Restoration Z Xiao, J Bai, Z Lu, Z Xiong arXiv preprint arXiv:2305.13620, 2023 | 17 | 2023 |
Versatile Weight Attack via Flipping Limited Bits J Bai, B Wu, Z Li, S Xia Transactions on Pattern Analysis and Machine Intelligence (T-PAMI), 2023 | 12 | 2023 |
Adversarial robustness for visual grounding of multimodal large language models K Gao, Y Bai, J Bai, Y Yang, ST Xia ICLR workshop, 2024 | 10 | 2024 |
Not all prompts are secure: A switchable backdoor attack against pre-trained vision transfomers S Yang, J Bai, K Gao, Y Yang, Y Li, ST Xia CVPR 2024, 24431-24441, 2024 | 8 | 2024 |
Beyond Sole Strength: Customized Ensembles for Generalized Vision-Language Models Z Lu, J Bai, X Li, Z Xiao, X Wang ICML 2024, 2024 | 8 | 2024 |
Clean-label Backdoor Attack against Deep Hashing based Retrieval K Gao*, J Bai*, B Chen, D Wu, ST Xia BMVC, 2023 | 5 | 2023 |
Practical Protection against Video Data Leakage via Universal Adversarial Head J Bai, B Chen, K Gao, X Wang, ST Xia Pattern Recognition, 2022 | 5 | 2022 |
Universal Adversarial Head: Practical Protection against Video Data Leakage J Bai, B Chen, D Wu, C Zhang, ST Xia ICML 2021 Workshop on Adversarial Machine Learning, 2021 | 5 | 2021 |