Dab-detr: Dynamic anchor boxes are better queries for detr S Liu, F Li, H Zhang, X Yang, X Qi, H Su, J Zhu, L Zhang arXiv preprint arXiv:2201.12329, 2022 | 796 | 2022 |
Bag of tricks for adversarial training T Pang, X Yang, Y Dong, H Su, J Zhu arXiv preprint arXiv:2010.00467, 2020 | 342* | 2020 |
Benchmarking adversarial robustness on image classification Y Dong, QA Fu, X Yang, T Pang, H Su, Z Xiao, J Zhu proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020 | 329 | 2020 |
Face anti-spoofing: Model matters, so does data X Yang, W Luo, L Bao, Y Gao, D Gong, S Zheng, Z Li, W Liu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 287 | 2019 |
Query2label: A simple transformer way to multi-label classification S Liu, L Zhang, X Yang, H Su, J Zhu arXiv preprint arXiv:2107.10834, 2021 | 226 | 2021 |
Boosting adversarial training with hypersphere embedding T Pang*, X Yang*, Y Dong, K Xu, J Zhu, H Su Advances in Neural Information Processing Systems 33, 7779-7792, 2020 | 167 | 2020 |
On evaluating adversarial robustness of large vision-language models Y Zhao, T Pang, C Du, X Yang, C Li, NMM Cheung, M Lin Advances in Neural Information Processing Systems 36, 2024 | 152 | 2024 |
Robustness and accuracy could be reconcilable by (proper) definition T Pang, M Lin, X Yang, J Zhu, S Yan International Conference on Machine Learning, 17258-17277, 2022 | 141 | 2022 |
Common diffusion noise schedules and sample steps are flawed S Lin, B Liu, J Li, X Yang Proceedings of the IEEE/CVF winter conference on applications of computer …, 2024 | 137 | 2024 |
Black-box detection of backdoor attacks with limited information and data Y Dong, X Yang, Z Deng, T Pang, Z Xiao, H Su, J Zhu Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 130 | 2021 |
A recipe for watermarking diffusion models Y Zhao, T Pang, C Du, X Yang, NM Cheung, M Lin arXiv preprint arXiv:2303.10137, 2023 | 112 | 2023 |
Localized dictionaries based orientation field estimation for latent fingerprints X Yang, J Feng, J Zhou IEEE transactions on pattern analysis and machine intelligence 36 (5), 955-969, 2014 | 108 | 2014 |
Towards face encryption by generating adversarial identity masks X Yang, Y Dong, T Pang, H Su, J Zhu, Y Chen, H Xue Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 104 | 2021 |
Benchmarking robustness of 3d object detection to common corruptions Y Dong, C Kang, J Zhang, Z Zhu, Y Wang, X Yang, H Su, X Wei, J Zhu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 84 | 2023 |
Exploring memorization in adversarial training Y Dong, K Xu, X Yang, T Pang, Z Deng, H Su, J Zhu arXiv preprint arXiv:2106.01606, 2021 | 83 | 2021 |
How Robust is Google's Bard to Adversarial Image Attacks? Y Dong, H Chen, J Chen, Z Fang, X Yang, Y Zhang, Y Tian, H Su, J Zhu arXiv preprint arXiv:2309.11751, 2023 | 81 | 2023 |
Libre: A practical bayesian approach to adversarial detection Z Deng, X Yang, S Xu, H Su, J Zhu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 70 | 2021 |
A comprehensive study on robustness of image classification models: Benchmarking and rethinking C Liu, Y Dong, W Xiang, X Yang, H Su, J Zhu, Y Chen, Y He, H Xue, ... International Journal of Computer Vision, 1-23, 2024 | 60 | 2024 |
Economic, environmental, and emergy analysis of China's green tea production Q Xu, Y Yang, K Hu, J Chen, SN Djomo, X Yang, MT Knudsen Sustainable Production and Consumption 28, 269-280, 2021 | 55 | 2021 |
Design and interpretation of universal adversarial patches in face detection X Yang, F Wei, H Zhang, J Zhu Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020 | 50 | 2020 |