Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Yekui Wang"'
Publikováno v:
PeerJ Computer Science, Vol 9, p e1435 (2023)
Self-distillation methods utilize Kullback-Leibler divergence (KL) loss to transfer the knowledge from the network itself, which can improve the model performance without increasing computational resources and complexity. However, when applied to sal
Externí odkaz:
https://doaj.org/article/b7fd831394c643c0a1a0b37993eb28ec
Autor:
Yekui Wang, Tieyong Cao, Yunfei Zheng, Zheng Fang, Yang Wang, Yajiu Liu, Lei Chen, Bingyang Fu
Publikováno v:
Security and Communication Networks. 2022:1-12
Deep neural networks have been proved vulnerable to being attacked by adversarial examples, which have attracted extensive attention from researchers. Existing GAN-based object detection adversarial example generation methods are efficient in generat
Publikováno v:
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering.
Autor:
Bingyang Fu, Tieyong Cao, Yunfei Zheng, Zheng Fang, Lei Chen, Yang Wang, Yekui Wang, Yong Wang
Publikováno v:
Applied optics. 61(27)
Recently, polarization-based models for camouflaged object segmentation have attracted research attention. However, to construct this camouflaged object segmentation model, the main challenge is to effectively fuse polarization and light intensity fe
Autor:
Yuefeng Chen, Xiaofeng Mao, Yuan He, Hui Xue, Chao Li, Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Fangcheng Liu, Chao Zhang, Hongyang Zhang, Yichi Zhang, Shilong Liu, Chang Liu, Yajie Wang, Huipeng Zhou, Haoran Lyu, Yidan Xu, Zixuan Xu, Taoyu Zhu, Wenjun Li, Xianfeng Gao, Guoqiu Wang, Huanqian Yan, Ying Guo, Chaoning Zhang, Zheng Fang, Yang Wang, Bingyang Fu, Yunfei Zheng, Yekui Wang, Haorong Luo, Zhen Yang
Publikováno v:
Ying Guo
Many works have investigated the adversarial attacks or defenses under the settings where a bounded and imperceptible perturbation can be added to the input. However in the real-world, the attacker does not need to comply with this restriction. In fa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ffa82f18c225a03857c21ce979519c50
http://arxiv.org/abs/2110.09903
http://arxiv.org/abs/2110.09903