Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
SymAttack: Symmetry-aware Imperceptible Adversarial Attacks on 3D Point Clouds
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 3131–3140https://doi.org/10.1145/3664647.3681181Adversarial attacks on point clouds are crucial for assessing and improving the adversarial robustness of 3D deep learning models. Despite leveraging various geometric constraints, current adversarial attack strategies often suffer from inadequate ...
- research-articleOctober 2024
Frequency-Aware GAN for Imperceptible Transfer Attack on 3D Point Clouds
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 6162–6171https://doi.org/10.1145/3664647.3681105With the development of depth sensors and 3D vision, the vulnerability of 3D point cloud models has garnered heightened concern. Almost all existing 3D attackers are deployed in the white-box setting, where they access the model details and directly ...
- ArticleNovember 2024
MIT: Multi-cue Injected Transformer for Two-Stage HOI Detection
AbstractTransformers have demonstrated potential in leveraging features for two-stage human-object interaction (HOI) detection, but a considerable performance gap persists compared to one-stage methods. We attribute this discrepancy to the limited ...
- ArticleOctober 2024
Hiding Imperceptible Noise in Curvature-Aware Patches for 3D Point Cloud Attack
AbstractWith the maturity of depth sensors, point clouds have received increasing attention in various 3D safety-critical applications, while deep point cloud learning models have been shown to be vulnerable to adversarial attacks. Most existing 3D ...
- ArticleOctober 2024
FLAT: Flux-Aware Imperceptible Adversarial Attacks on 3D Point Clouds
AbstractAdversarial attacks on point clouds play a vital role in assessing and enhancing the adversarial robustness of 3D deep learning models. While employing a variety of geometric constraints, existing adversarial attack solutions often display ...
-
- research-articleMay 2024
Improving adversarial transferability through hybrid augmentation
AbstractMany works have shown that the adversarial examples being generated on a known substitute model have the ability to mislead other unknown black-box models, which has attracted widespread attention. Recently, many model augmentation methods have ...
- research-articleMarch 2024
A Novel Fuzzy Neural Network Architecture Search Framework for Defect Recognition With Uncertainties
IEEE Transactions on Fuzzy Systems (TOFS), Volume 32, Issue 5Pages 3274–3285https://doi.org/10.1109/TFUZZ.2024.3373792Defect recognition is an important task in intelligent manufacturing. Due to the subjectivity of human annotation, the collected defect data usually contains a lot of noise and unpredictable uncertainties, which have a great negative influence on defect ...
- research-articleApril 2024
A knowledge-guided graph attention network for emotion-cause pair extraction
AbstractEmotion-Cause Pair Extraction (ECPE) is a research objective focused on identifying and extracting all emotion-clause and cause-clause pairs from unannotated emotional text. Traditional methodologies have predominantly employed attention ...
- research-articleJuly 2024
SelfGCN: Graph Convolution Network With Self-Attention for Skeleton-Based Action Recognition
- Zhize Wu,
- Pengpeng Sun,
- Xin Chen,
- Keke Tang,
- Tong Xu,
- Le Zou,
- Xiaofeng Wang,
- Ming Tan,
- Fan Cheng,
- Thomas Weise
IEEE Transactions on Image Processing (TIP), Volume 33Pages 4391–4403https://doi.org/10.1109/TIP.2024.3433581Graph Convolutional Networks (GCNs) are widely used for skeleton-based action recognition and achieved remarkable performance. Due to the locality of graph convolution, GCNs can only utilize short-range node dependencies but fail to model long-range node ...
- short-paperOctober 2023
HEPT Attack: Heuristic Perpendicular Trial for Hard-label Attacks under Limited Query Budgets
CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge ManagementPages 4064–4068https://doi.org/10.1145/3583780.3615198Exploring adversarial attacks on deep neural networks (DNNs) is crucial for assessing and enhancing their adversarial robustness. Among various attack types, hard-label attacks that rely only on predicted labels offer a practical approach. This paper ...
- ArticleAugust 2023
DBA: An Efficient Approach to Boost Transfer-Based Adversarial Attack Performance Through Information Deletion
Knowledge Science, Engineering and ManagementPages 276–288https://doi.org/10.1007/978-3-031-40286-9_23AbstractIn practice, deep learning models are easy to be fooled by input images with subtle perturbations, and those images are called adversarial examples. Regarding one model, the crafted adversarial examples can successfully fool other models with ...
- research-articleApril 2023
Unsupervised feature selection through combining graph learning and ℓ 2 , 0-norm constraint
Information Sciences: an International Journal (ISCI), Volume 622, Issue CPages 68–82https://doi.org/10.1016/j.ins.2022.11.156AbstractGraph-based unsupervised feature selection algorithms have been shown to be promising for handling unlabeled and high-dimensional data. Whereas, the vast majority of those algorithms usually involve two independent processes, i.e., similarity ...
- research-articleMarch 2023
Multimodal fake news detection through data augmentation-based contrastive learning
AbstractDuring the information exploding era, news can be created or edited purposely for promoting the spreading of social influence. However, unverified or fabricated news can also spread unscrupulously, leading to serious consequences, such as poor ...
Highlights- We present a new multimodal fake news detection framework with contrastive learning.
- The combination of back-translation and contrastive learning is proved effective.
- The specific effects of contrastive learning and different image ...
- research-articleFebruary 2023
Deep manifold attack on point clouds via parameter plane stretching
AAAI'23/IAAI'23/EAAI'23: Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 269, Pages 2420–2428https://doi.org/10.1609/aaai.v37i2.25338Adversarial attack on point clouds plays a vital role in evaluating and improving the adversarial robustness of 3D deep learning models. Existing attack methods are mainly applied by point perturbation in a non-manifold manner. In this paper, we formulate ...
- research-articleJanuary 2023
Feature Extraction and Signal Enhancement Based on Unsaturation Piecewise Tri-Stable Stochastic Resonance Driven by Lévy Noise
As science advances and machines become larger and more sophisticated, it is vital to determine whether there is a mechanical failure without damaging the device. Stochastic resonance (SR), as a widely used method, can effectively extract the periodic ...
- research-articleOctober 2022
RepPVConv: attentively fusing reparameterized voxel features for efficient 3D point cloud perception
The Visual Computer: International Journal of Computer Graphics (VISC), Volume 39, Issue 11Pages 5577–5588https://doi.org/10.1007/s00371-022-02682-0AbstractDesigning efficient deep learning models for 3D point clouds is an important research topic. Point-voxel convolution (Liu et al. in NeurIPS, 2019) is a pioneering approach in this direction, but it still has considerable room for improvement in ...
- ArticleAugust 2022
GM-Attack: Improving the Transferability of Adversarial Attacks
Knowledge Science, Engineering and ManagementPages 489–500https://doi.org/10.1007/978-3-031-10989-8_39AbstractIn the real world, blackbox attacks seem to be widely existed due to the lack of detailed information of models to be attacked. Hence, it is desirable to obtain adversarial examples with high transferability which will facilitate practical ...
- research-articleJanuary 2022
Spatio-Frequency Decoupled Weak-Supervision for Face Reconstruction
3D face reconstruction has witnessed considerable progress in recovering 3D face shapes and textures from in-the-wild images. However, due to a lack of texture detail information, the reconstructed shape and texture based on deep learning could not be ...
- research-articleJanuary 2022
A Convex Relaxation Approach for Learning the Robust Koopman Operator
Although data-driven models, especially deep learning, have achieved astonishing results on many prediction tasks for nonlinear sequences, challenges still remain in finding an appropriate way to embed prior knowledge of physical dynamics in these models. ...