关注
YANRU XIAO
YANRU XIAO
Amazon Web Services
在 amazon.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
You See What I Want You To See: Exploring Targeted Black-Box Transferability Attack for Hash-Based Image Retrieval Systems
Y Xiao, C Wang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
292021
A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices
C Wang, Y Xiao, X Gao, L Li, J Wang
IEEE Transactions on Mobile Computing, 2021
212021
Why batch normalization works? a buckling perspective
L Chen, H Fei, Y Xiao, J He, H Li
2017 IEEE International Conference on Information and Automation (ICIA …, 2017
182017
Evade Deep Image Retrieval by Stashing Private Images in the Hash Space
Y Xiao, C Wang, X Gao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
172020
Close the Gap between Deep Learning and Mobile Intelligence by Incorporating Training in the Loop
C Wang, Y Xiao, X Gao, L Li, J Wang
Proceedings of the 27th ACM International Conference on Multimedia, 1419-1427, 2019
102019
Drivers’ Understanding of Artificial Intelligence in Automated Driving Systems: A Study of a Malicious Stop Sign
KR Garcia, S Mishler, Y Xiao, C Wang, B Hu, JD Still, J Chen
Journal of Cognitive Engineering and Decision Making 16 (4), 237-251, 2022
62022
Unsupervised Multi-Criteria Adversarial Detection in Deep Image Retrieval
Y Xiao, C Wang, X Gao
arXiv preprint arXiv:2304.04228, 2023
2023
Identifying Perturbed Roadway Signs: Perception of AI Capabilities
K Garcia, Y Xiao, S Mishler, C Wang, B Hu, J Chen
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66 (1 …, 2022
2022
Towards Privacy and Security Concerns of Adversarial Examples in Deep Hashing Image Retrieval
Y Xiao
Old Dominion University, 2022
2022
Human Perception of AI Capabilities in Identifying Malicious Roadway Signs
KR Garcia, Y Xiao, S Mishler, C Wang, B Hu, J Chen
PubPub, 2021
2021
Supplementary Material: You See What I Want You to See: Exploring Targeted Black-Box Transferability Attack for Hash-based Image Retrieval Systems
Y Xiao, C Wang
系统目前无法执行此操作,请稍后再试。
文章 1–11