关注
Jiawang Bai
Jiawang Bai
在 mails.tsinghua.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Targeted attack for deep hashing based retrieval
J Bai, B Chen, Y Li, D Wu, W Guo, S Xia, E Yang
European Conference on Computer Vision (Oral), 618-634, 2020
842020
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
J Bai, B Wu, Y Zhang, Y Li, Z Li, ST Xia
International Conference on Learning Representations, 2021
662021
Multinomial Random Forest
J Bai, Y Li, J Li, X Yang, Y Jiang, ST Xia
Pattern Recognition, 108331, 2021
632021
Improving Vision Transformers by Revisiting High-frequency Components
J Bai, L Yuan, ST Xia, S Yan, Z Li, W Liu
European Conference on Computer Vision, 2022, 2022
552022
Open-sourced Dataset Protection via Backdoor Watermarking
Y Li, Z Zhang, J Bai, B Wu, Y Jiang, ST Xia
NeurIPS 2020 Workshop on Dataset Curation and Security, 2020
402020
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
J Bai, K Gao, D Gong, ST Xia, Z Li, W Liu
European Conference on Computer Vision, 2022, 2022
232022
GraphAdapter: Tuning Vision-Language Models With Dual Knowledge Graph
X Li, D Lian, Z Lu, J Bai, Z Chen, X Wang
NeurIPS 2023, 2023
212023
Can SAM Boost Video Super-Resolution?
Z Lu, Z Xiao, J Bai, Z Xiong, X Wang
arXiv preprint arXiv:2305.06524, 2023
202023
Imperceptible and Robust Backdoor Attack in 3D Point Cloud
K Gao*, J Bai*, B Wu, M Ya, ST Xia
Transactions on Information Forensics and Security (TIFS), 2022
20*2022
Rectified Decision Trees: Exploring the Landscape of Interpretable and Effective Machine Learning
Y Li, J Bai, J Li, X Yang, Y Jiang, ST Xia
arXiv preprint arXiv:2008.09413, 2020
18*2020
Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval
B Chen, Y Feng, T Dai, J Bai, Y Jiang, ST Xia, X Wang
IEEE Transactions on Pattern Analysis & Machine Intelligence, 1-1, 2022
172022
Versatile Weight Attack via Flipping Limited Bits
J Bai, B Wu, Z Li, S Xia
Transactions on Pattern Analysis and Machine Intelligence (T-PAMI), 2023
82023
A Dive into SAM Prior in Image Restoration
Z Xiao, J Bai, Z Lu, Z Xiong
arXiv preprint arXiv:2305.13620, 2023
82023
BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP
J Bai, K Gao, S Min, ST Xia, Z Li, W Liu
CVPR 2024, 2024
62024
Clean-label Backdoor Attack against Deep Hashing based Retrieval
K Gao*, J Bai*, B Chen, D Wu, ST Xia
BMVC, 2023
42023
Universal Adversarial Head: Practical Protection against Video Data Leakage
J Bai, B Chen, D Wu, C Zhang, ST Xia
ICML 2021 Workshop on Adversarial Machine Learning, 2021
42021
Beyond Sole Strength: Customized Ensembles for Generalized Vision-Language Models
Z Lu, J Bai, X Li, Z Xiao, X Wang
ICML 2024, 2024
32024
Practical Protection against Video Data Leakage via Universal Adversarial Head
J Bai, B Chen, K Gao, X Wang, ST Xia
Pattern Recognition, 2022
32022
Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
X Wang, J Bai, X Xu, X Li
arXiv preprint arXiv:2303.12658, 2023
12023
系统目前无法执行此操作,请稍后再试。
文章 1–19