关注
Shu-Tao Xia
Shu-Tao Xia
在 sz.tsinghua.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Second-order attention network for single image super-resolution
T Dai, J Cai, Y Zhang, ST Xia, L Zhang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
18062019
Adversarial weight perturbation helps robust generalization
D Wu, ST Xia, Y Wang
Advances in neural information processing systems 33, 2958-2969, 2020
7342020
Backdoor learning: A survey
Y Li, Y Jiang, Z Li, ST Xia
IEEE Transactions on Neural Networks and Learning Systems 35 (1), 5-22, 2022
6122022
Maintaining discrimination and fairness in class incremental learning
B Zhao, X Xiao, G Gan, B Zhang, ST Xia
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
4752020
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, S Erfani, S Xia, S Wijewickrema, ...
International Conference on Machine Learning, 3355-3364, 2018
4532018
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE conference on computer vision and pattern …, 2018
3582018
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
3562020
Tokenpose: Learning keypoint tokens for human pose estimation
Y Li, S Zhang, Z Wang, S Yang, W Yang, ST Xia, E Zhou
Proceedings of the IEEE/CVF International conference on computer vision …, 2021
2892021
Rethinking the trigger of backdoor attack
Y Li, T Zhai, B Wu, Y Jiang, Z Li, S Xia
arXiv preprint arXiv:2004.04692, 2020
1572020
Johnson type bounds on constant dimension codes
ST Xia, FW Fu
Designs, Codes and Cryptography 50, 163-172, 2009
1482009
Improving adversarial robustness via channel-wise activation suppressing
Y Bai, Y Zeng, Y Jiang, ST Xia, X Ma, Y Wang
arXiv preprint arXiv:2103.08307, 2021
1242021
Backdoor attack against speaker verification
T Zhai, Y Li, Z Zhang, B Wu, Y Jiang, ST Xia
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
1132021
Simcc: A simple coordinate classification perspective for human pose estimation
Y Li, S Yang, P Liu, S Zhang, Y Wang, Z Wang, W Yang, ST Xia
European Conference on Computer Vision, 89-106, 2022
1112022
Byte segment neural network for network traffic classification
R Li, X Xiao, S Ni, H Zheng, S Xia
2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 1-10, 2018
1102018
CNN–MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites
X Xiao, D Zhang, G Hu, Y Jiang, S Xia
Neural Networks 125, 303-312, 2020
1012020
Backdoor attack in the physical world
Y Li, T Zhai, Y Jiang, Z Li, ST Xia
arXiv preprint arXiv:2104.02361, 2021
992021
A novel consistent random forest framework: Bernoulli random forests
Y Wang, ST Xia, Q Tang, J Wu, X Zhu
IEEE transactions on neural networks and learning systems 29 (8), 3510-3523, 2017
992017
Constructions of Optimal Cyclic Locally Repairable Codes
B Chen, ST Xia, J Hao, FW Fu
IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017
952017
Fakd: Feature-affinity based knowledge distillation for efficient image super-resolution
Z He, T Dai, J Lu, Y Jiang, ST Xia
2020 IEEE International Conference on Image Processing (ICIP), 518-522, 2020
922020
Targeted attack for deep hashing based retrieval
J Bai, B Chen, Y Li, D Wu, W Guo, S Xia, E Yang
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
892020
系统目前无法执行此操作,请稍后再试。
文章 1–20