1 code implementation • 25 Apr 2024 • Lihua Jing, Rui Wang, Wenqi Ren, Xin Dong, Cong Zou
Adversarial patch attacks present a significant threat to real-world object detectors due to their practical feasibility.
1 code implementation • ICCV 2023 • Zixuan Zhu, Rui Wang, Cong Zou, Lihua Jing
This inspires us to propose a novel dual-network training framework: The Victim and The Beneficiary (V&B), which exploits a poisoned model to train a clean model without extra benign samples.
no code implementations • 10 Apr 2023 • Cong Zou, Wei Chen
It was the L_2 L_infinity performance index that for the first time is initiated into the discussion on state estimation of delayed MJNNs with with partially known transition probabilities, which provides a more general promotion for the estimation error. The WTOD protocol is adopted to dispatch the sensor nodes so as to effectively alleviate the updating frequency of output signals.
1 code implementation • 25 Nov 2018 • Dong Liang, Rui Wang, Xiaowei Tian, Cong Zou
Human image generation is a very challenging task since it is affected by many factors.