Follow
Xiao Yang
Xiao Yang
Verified email at mails.tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dab-detr: Dynamic anchor boxes are better queries for detr
S Liu, F Li, H Zhang, X Yang, X Qi, H Su, J Zhu, L Zhang
arXiv preprint arXiv:2201.12329, 2022
7962022
Bag of tricks for adversarial training
T Pang, X Yang, Y Dong, H Su, J Zhu
arXiv preprint arXiv:2010.00467, 2020
342*2020
Benchmarking adversarial robustness on image classification
Y Dong, QA Fu, X Yang, T Pang, H Su, Z Xiao, J Zhu
proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
3292020
Face anti-spoofing: Model matters, so does data
X Yang, W Luo, L Bao, Y Gao, D Gong, S Zheng, Z Li, W Liu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
2872019
Query2label: A simple transformer way to multi-label classification
S Liu, L Zhang, X Yang, H Su, J Zhu
arXiv preprint arXiv:2107.10834, 2021
2262021
Boosting adversarial training with hypersphere embedding
T Pang*, X Yang*, Y Dong, K Xu, J Zhu, H Su
Advances in Neural Information Processing Systems 33, 7779-7792, 2020
1672020
On evaluating adversarial robustness of large vision-language models
Y Zhao, T Pang, C Du, X Yang, C Li, NMM Cheung, M Lin
Advances in Neural Information Processing Systems 36, 2024
1522024
Robustness and accuracy could be reconcilable by (proper) definition
T Pang, M Lin, X Yang, J Zhu, S Yan
International Conference on Machine Learning, 17258-17277, 2022
1412022
Common diffusion noise schedules and sample steps are flawed
S Lin, B Liu, J Li, X Yang
Proceedings of the IEEE/CVF winter conference on applications of computer …, 2024
1372024
Black-box detection of backdoor attacks with limited information and data
Y Dong, X Yang, Z Deng, T Pang, Z Xiao, H Su, J Zhu
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021
1302021
A recipe for watermarking diffusion models
Y Zhao, T Pang, C Du, X Yang, NM Cheung, M Lin
arXiv preprint arXiv:2303.10137, 2023
1122023
Localized dictionaries based orientation field estimation for latent fingerprints
X Yang, J Feng, J Zhou
IEEE transactions on pattern analysis and machine intelligence 36 (5), 955-969, 2014
1082014
Towards face encryption by generating adversarial identity masks
X Yang, Y Dong, T Pang, H Su, J Zhu, Y Chen, H Xue
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021
1042021
Benchmarking robustness of 3d object detection to common corruptions
Y Dong, C Kang, J Zhang, Z Zhu, Y Wang, X Yang, H Su, X Wei, J Zhu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
842023
Exploring memorization in adversarial training
Y Dong, K Xu, X Yang, T Pang, Z Deng, H Su, J Zhu
arXiv preprint arXiv:2106.01606, 2021
832021
How Robust is Google's Bard to Adversarial Image Attacks?
Y Dong, H Chen, J Chen, Z Fang, X Yang, Y Zhang, Y Tian, H Su, J Zhu
arXiv preprint arXiv:2309.11751, 2023
812023
Libre: A practical bayesian approach to adversarial detection
Z Deng, X Yang, S Xu, H Su, J Zhu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
702021
A comprehensive study on robustness of image classification models: Benchmarking and rethinking
C Liu, Y Dong, W Xiang, X Yang, H Su, J Zhu, Y Chen, Y He, H Xue, ...
International Journal of Computer Vision, 1-23, 2024
602024
Economic, environmental, and emergy analysis of China's green tea production
Q Xu, Y Yang, K Hu, J Chen, SN Djomo, X Yang, MT Knudsen
Sustainable Production and Consumption 28, 269-280, 2021
552021
Design and interpretation of universal adversarial patches in face detection
X Yang, F Wei, H Zhang, J Zhu
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
502020
The system can't perform the operation now. Try again later.
Articles 1–20