Skip to main content

Showing 51–100 of 188 results for author: Xiang, W

.
  1. arXiv:2303.14395  [pdf, other

    cs.CV

    MDQE: Mining Discriminative Query Embeddings to Segment Occluded Instances on Challenging Videos

    Authors: Minghan Li, Shuai Li, Wangmeng Xiang, Lei Zhang

    Abstract: While impressive progress has been achieved, video instance segmentation (VIS) methods with per-clip input often fail on challenging videos with occluded objects and crowded scenes. This is mainly because instance queries in these methods cannot encode well the discriminative embeddings of instances, making the query-based segmenter difficult to distinguish those `hard' instances. To address these… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

    Journal ref: The IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023

  2. arXiv:2303.09769  [pdf, other

    cs.CV cs.LG

    Denoising Diffusion Autoencoders are Unified Self-supervised Learners

    Authors: Weilai Xiang, Hongyu Yang, Di Huang, Yunhong Wang

    Abstract: Inspired by recent advances in diffusion models, which are reminiscent of denoising autoencoders, we investigate whether they can acquire discriminative representations for classification via generative pre-training. This paper shows that the networks in diffusion models, namely denoising diffusion autoencoders (DDAE), are unified self-supervised learners: by pre-training on unconditional image ge… ▽ More

    Submitted 19 August, 2023; v1 submitted 17 March, 2023; originally announced March 2023.

    Comments: ICCV 2023 Oral

  3. arXiv:2303.08525  [pdf, other

    cs.CV eess.IV

    MRGAN360: Multi-stage Recurrent Generative Adversarial Network for 360 Degree Image Saliency Prediction

    Authors: Pan Gao, Xinlang Chen, Rong Quan, Wei Xiang

    Abstract: Thanks to the ability of providing an immersive and interactive experience, the uptake of 360 degree image content has been rapidly growing in consumer and industrial applications. Compared to planar 2D images, saliency prediction for 360 degree images is more challenging due to their high resolutions and spherical viewing ranges. Currently, most high-performance saliency prediction models for omn… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

  4. arXiv:2303.04935  [pdf, other

    cs.CV

    X-Pruner: eXplainable Pruning for Vision Transformers

    Authors: Lu Yu, Wei Xiang

    Abstract: Recently vision transformer models have become prominent models for a range of tasks. These models, however, usually suffer from intensive computational costs and heavy memory requirements, making them impractical for deployment on edge platforms. Recent studies have proposed to prune transformers in an unexplainable manner, which overlook the relationship between internal units of the model and t… ▽ More

    Submitted 5 June, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

  5. arXiv:2303.03808  [pdf, other

    cs.CV

    Multiscale Tensor Decomposition and Rendering Equation Encoding for View Synthesis

    Authors: Kang Han, Wei Xiang

    Abstract: Rendering novel views from captured multi-view images has made considerable progress since the emergence of the neural radiance field. This paper aims to further advance the quality of view synthesis by proposing a novel approach dubbed the neural radiance feature field (NRFF). We first propose a multiscale tensor decomposition scheme to organize learnable features so as to represent scenes from c… ▽ More

    Submitted 27 May, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

  6. arXiv:2302.14302  [pdf, other

    cs.CV

    Improving Model Generalization by On-manifold Adversarial Augmentation in the Frequency Domain

    Authors: Chang Liu, Wenzhao Xiang, Yuan He, Hui Xue, Shibao Zheng, Hang Su

    Abstract: Deep neural networks (DNNs) may suffer from significantly degenerated performance when the training and test data are of different underlying distributions. Despite the importance of model generalization to out-of-distribution (OOD) data, the accuracy of state-of-the-art (SOTA) models on OOD data can plummet. Recent work has demonstrated that regular or off-manifold adversarial examples, as a spec… ▽ More

    Submitted 8 June, 2024; v1 submitted 27 February, 2023; originally announced February 2023.

  7. arXiv:2302.14301  [pdf, other

    cs.CV

    A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking

    Authors: Chang Liu, Yinpeng Dong, Wenzhao Xiang, Xiao Yang, Hang Su, Jun Zhu, Yuefeng Chen, Yuan He, Hui Xue, Shibao Zheng

    Abstract: The robustness of deep neural networks is usually lacking under adversarial examples, common corruptions, and distribution shifts, which becomes an important research problem in the development of deep learning. Although new deep learning methods and robustness improvement techniques have been constantly proposed, the robustness evaluations of existing methods are often inadequate due to their rap… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

    Comments: International Journal of Computer Vision (IJCV) [under review]

  8. arXiv:2302.12420  [pdf, other

    cs.CV cs.AI

    An Iterative Classification and Semantic Segmentation Network for Old Landslide Detection Using High-Resolution Remote Sensing Images

    Authors: Zili Lu, Yuexing Peng, Wei Li, Junchuan Yu, Daqing Ge, Wei Xiang

    Abstract: Huge challenges exist for old landslide detection because their morphology features have been partially or strongly transformed over a long time and have little difference from their surrounding. Besides, small-sample problem also restrict in-depth learning. In this paper, an iterative classification and semantic segmentation network (ICSSN) is developed, which can greatly enhance both object-le… ▽ More

    Submitted 24 April, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

  9. arXiv:2302.03298  [pdf, other

    cs.CV cs.AI

    Diversity is Definitely Needed: Improving Model-Agnostic Zero-shot Classification via Stable Diffusion

    Authors: Jordan Shipard, Arnold Wiliem, Kien Nguyen Thanh, Wei Xiang, Clinton Fookes

    Abstract: In this work, we investigate the problem of Model-Agnostic Zero-Shot Classification (MA-ZSC), which refers to training non-specific classification architectures (downstream models) to classify real images without using any real images during training. Recent research has demonstrated that generating synthetic training images using diffusion models provides a potential solution to address MA-ZSC. H… ▽ More

    Submitted 16 April, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: (10 pages, 6 figures, 3 tables, preprint)

    MSC Class: 68T07 ACM Class: I.2; I.4; I.5

  10. arXiv:2302.01825  [pdf, other

    cs.CV cs.AI

    HDFormer: High-order Directed Transformer for 3D Human Pose Estimation

    Authors: Hanyuan Chen, Jun-Yan He, Wangmeng Xiang, Zhi-Qi Cheng, Wei Liu, Hanbing Liu, Bin Luo, Yifeng Geng, Xuansong Xie

    Abstract: Human pose estimation is a challenging task due to its structured data sequence nature. Existing methods primarily focus on pair-wise interaction of body joints, which is insufficient for scenarios involving overlap** joints and rapidly changing poses. To overcome these issues, we introduce a novel approach, the High-order Directed Transformer (HDFormer), which leverages high-order bone and join… ▽ More

    Submitted 22 May, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted to IJCAI 2023; 9 pages, 5 figures, 7 tables; the code is at https://github.com/hyer/HDFormer

    Journal ref: In the 32nd international Joint Conference on Artificial Intelligence (IJCAI 2023)

  11. arXiv:2301.07531  [pdf, other

    cs.LG cs.AI

    Safety Verification of Neural Network Control Systems Using Guaranteed Neural Network Model Reduction

    Authors: Weiming Xiang, Zhongzhu Shao

    Abstract: This paper aims to enhance the computational efficiency of safety verification of neural network control systems by develo** a guaranteed neural network model reduction method. First, a concept of model reduction precision is proposed to describe the guaranteed distance between the outputs of a neural network and its reduced-size version. A reachability-based algorithm is proposed to accurately… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

    Comments: CDC 2022, Cancun, Mexico

  12. arXiv:2211.00936  [pdf, ps, other

    math.AP

    Local Well-posedness of Unsteady Potential Flows Near a Space Corner of Right Angle

    Authors: Beixiang Fang, Wei Xiang, Feng Xiao

    Abstract: In this paper we are concerned with the local well-posedness of the unsteady potential flows near a space corner of right angle, which could be formulated as an initial-boundary value problem of a hyperbolic equation of second order in a cornered-space domain. The corner singularity is the key difficulty in establishing the local well-posedness of the problem. Moreover, the boundary conditions on… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

  13. arXiv:2210.15843  [pdf, other

    cs.CL

    Bi-Directional Iterative Prompt-Tuning for Event Argument Extraction

    Authors: Lu Dai, Bang Wang, Wei Xiang, Yijun Mo

    Abstract: Recently, prompt-tuning has attracted growing interests in event argument extraction (EAE). However, the existing prompt-tuning methods have not achieved satisfactory performance due to the lack of consideration of entity information. In this paper, we propose a bi-directional iterative prompt-tuning method for EAE, where the EAE task is treated as a cloze-style task to take full advantage of enti… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

    Comments: To be accept by EMNLP 2022 as a full paper

  14. arXiv:2210.15511  [pdf, other

    cs.CV cs.AI cs.MM

    ProContEXT: Exploring Progressive Context Transformer for Tracking

    Authors: **-Peng Lan, Zhi-Qi Cheng, Jun-Yan He, Chenyang Li, Bin Luo, Xu Bao, Wangmeng Xiang, Yifeng Geng, Xuansong Xie

    Abstract: Existing Visual Object Tracking (VOT) only takes the target area in the first frame as a template. This causes tracking to inevitably fail in fast-changing and crowded scenes, as it cannot account for changes in object appearance between frames. To this end, we revamped the tracking framework with Progressive Context Encoding Transformer Tracker (ProContEXT), which coherently exploits spatial and… ▽ More

    Submitted 30 March, 2023; v1 submitted 27 October, 2022; originally announced October 2022.

    Comments: Accepted at ICASSP 2023, source code is at https://github.com/zhiqic/ProContEXT

  15. arXiv:2209.13933  [pdf, other

    cs.CV

    DPNet: Dual-Path Network for Real-time Object Detection with Lightweight Attention

    Authors: Quan Zhou, Huimin Shi, Weikang Xiang, Bin Kang, Xiaofu Wu, Longin Jan Latecki

    Abstract: The recent advances of compressing high-accuracy convolution neural networks (CNNs) have witnessed remarkable progress for real-time object detection. To accelerate detection speed, lightweight detectors always have few convolution layers using single-path backbone. Single-path architecture, however, involves continuous pooling and downsampling operations, always resulting in coarse and inaccurate… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

  16. arXiv:2208.09786  [pdf, other

    eess.SP

    A New Radar Signal Multiparameter-Based Deinterleaving Method

    Authors: Wang Chao, Liu Weisong, Li Xueqiong, Wang Xiang, Huang Zhitao

    Abstract: Radar signal deinterleaving has been extensively and thoroughly investigated in the electronic reconnaissance field. In this work, a new radar signal multiparameter-based deinterleaving method is proposed. In this method, semantic information composed of the pulse repetition interval (PRI), pulse width (PW), radio frequency (RF), and pulse amplitude (PA) of a radar signal is used to deinterleave r… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

  17. arXiv:2208.05318  [pdf, other

    cs.CV cs.AI cs.LG cs.MM

    Generative Action Description Prompts for Skeleton-based Action Recognition

    Authors: Wangmeng Xiang, Chao Li, Yuxuan Zhou, Biao Wang, Lei Zhang

    Abstract: Skeleton-based action recognition has recently received considerable attention. Current approaches to skeleton-based action recognition are typically formulated as one-hot classification tasks and do not fully exploit the semantic relations between actions. For example, "make victory sign" and "thumb up" are two actions of hand gestures, whose major difference lies in the movement of hands. This i… ▽ More

    Submitted 5 September, 2023; v1 submitted 10 August, 2022; originally announced August 2022.

    Comments: Accepted by ICCV23

  18. arXiv:2207.13670  [pdf, other

    cs.CV

    Meta-Interpolation: Time-Arbitrary Frame Interpolation via Dual Meta-Learning

    Authors: Shixing Yu, Yiyang Ma, Wenhan Yang, Wei Xiang, Jiaying Liu

    Abstract: Existing video frame interpolation methods can only interpolate the frame at a given intermediate time-step, e.g. 1/2. In this paper, we aim to explore a more generalized kind of video frame interpolation, that at an arbitrary time-step. To this end, we consider processing different time-steps with adaptively generated convolutional kernels in a unified way with the help of meta-learning. Specific… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  19. arXiv:2207.13259  [pdf, other

    cs.CV cs.AI cs.LG

    Spatiotemporal Self-attention Modeling with Temporal Patch Shift for Action Recognition

    Authors: Wangmeng Xiang, Chao Li, Biao Wang, Xihan Wei, Xian-Sheng Hua, Lei Zhang

    Abstract: Transformer-based methods have recently achieved great advancement on 2D image-based vision tasks. For 3D video-based tasks such as action recognition, however, directly applying spatiotemporal transformers on video data will bring heavy computation and memory burdens due to the largely increased number of patches and the quadratic complexity of self-attention computation. How to efficiently and e… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

    Comments: Accepted by ECCV22

  20. arXiv:2207.05358  [pdf, other

    cs.CV

    eX-ViT: A Novel eXplainable Vision Transformer for Weakly Supervised Semantic Segmentation

    Authors: Lu Yu, Wei Xiang, Juan Fang, Yi-** Phoebe Chen, Lianhua Chi

    Abstract: Recently vision transformer models have become prominent models for a range of vision tasks. These models, however, are usually opaque with weak feature interpretability. Moreover, there is no method currently built for an intrinsically interpretable transformer, which is able to explain its reasoning process and provide a faithful explanation. To close these crucial gaps, we propose a novel visio… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  21. arXiv:2206.15138  [pdf, other

    cs.CV

    DFGC 2022: The Second DeepFake Game Competition

    Authors: Bo Peng, Wei Xiang, Yue Jiang, Wei Wang, **g Dong, Zhenan Sun, Zhen Lei, Siwei Lyu

    Abstract: This paper presents the summary report on our DFGC 2022 competition. The DeepFake is rapidly evolving, and realistic face-swaps are becoming more deceptive and difficult to detect. On the contrary, methods for detecting DeepFakes are also improving. There is a two-party game between DeepFake creators and defenders. This competition provides a common platform for benchmarking the game between the c… ▽ More

    Submitted 3 October, 2022; v1 submitted 30 June, 2022; originally announced June 2022.

    Comments: Accepted by IJCB 2022

  22. arXiv:2206.07662  [pdf, other

    cs.CV

    SP-ViT: Learning 2D Spatial Priors for Vision Transformers

    Authors: Yuxuan Zhou, Wangmeng Xiang, Chao Li, Biao Wang, Xihan Wei, Lei Zhang, Margret Keuper, Xiansheng Hua

    Abstract: Recently, transformers have shown great potential in image classification and established state-of-the-art results on the ImageNet benchmark. However, compared to CNNs, transformers converge slowly and are prone to overfitting in low-data regimes due to the lack of spatial inductive biases. Such spatial inductive biases can be especially beneficial since the 2D structure of an input image is not w… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

    ACM Class: I.4

  23. arXiv:2206.05168  [pdf, other

    eess.SP

    Multi-faceted Graph Attention Network for Radar Target Recognition in Heterogeneous Radar Network

    Authors: Han Meng, Yuexing Peng, Wei Xiang, Xu Pang, Wenbo Wang

    Abstract: Radar target recognition (RTR), as a key technology of intelligent radar systems, has been well investigated. Accurate RTR at low signal-to-noise ratios (SNRs) still remains an open challenge. Most existing methods are based on a single radar or the homogeneous radar network, which do not fully exploit frequency-dimensional information. In this paper, a two-stream semantic feature fusion model, te… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

    Comments: 6 pages, 4 figures

    Journal ref: The paper is under consideration at Pattern Recognition Letters, Elsevier, 2022

  24. arXiv:2205.06891  [pdf, ps, other

    eess.IV cs.CV physics.med-ph

    Unsupervised Representation Learning for 3D MRI Super Resolution with Degradation Adaptation

    Authors: Jianan Liu, Hao Li, Tao Huang, Euijoon Ahn, Kang Han, Adeel Razi, Wei Xiang, **man Kim, David Dagan Feng

    Abstract: High-resolution (HR) magnetic resonance imaging is critical in aiding doctors in their diagnoses and image-guided treatments. However, acquiring HR images can be time-consuming and costly. Consequently, deep learning-based super-resolution reconstruction (SRR) has emerged as a promising solution for generating super-resolution (SR) images from low-resolution (LR) images. Unfortunately, training su… ▽ More

    Submitted 24 April, 2024; v1 submitted 13 May, 2022; originally announced May 2022.

    Comments: Accepted by IEEE Transactions on Artificial Intelligence

  25. arXiv:2204.07360  [pdf, other

    eess.SP cs.LG

    Spatio-Temporal-Frequency Graph Attention Convolutional Network for Aircraft Recognition Based on Heterogeneous Radar Network

    Authors: Han Meng, Yuexing Peng, Wenbo Wang, Peng Cheng, Yonghui Li, Wei Xiang

    Abstract: This paper proposes a knowledge-and-data-driven graph neural network-based collaboration learning model for reliable aircraft recognition in a heterogeneous radar network. The aircraft recognizability analysis shows that: (1) the semantic feature of an aircraft is motion patterns driven by the kinetic characteristics, and (2) the grammatical features contained in the radar cross-section (RCS) sign… ▽ More

    Submitted 15 April, 2022; originally announced April 2022.

    Comments: 11 pages, 17 figures

  26. Contrastive Learning for Automotive mmWave Radar Detection Points Based Instance Segmentation

    Authors: Weiyi Xiong, Jianan Liu, Yuxuan Xia, Tao Huang, Bing Zhu, Wei Xiang

    Abstract: The automotive mmWave radar plays a key role in advanced driver assistance systems (ADAS) and autonomous driving. Deep learning-based instance segmentation enables real-time object identification from the radar detection points. In the conventional training process, accurate annotation is the key. However, high-quality annotations of radar detection points are challenging to achieve due to their a… ▽ More

    Submitted 5 February, 2023; v1 submitted 12 March, 2022; originally announced March 2022.

    Comments: Accepted by IEEE ITSC 2022

  27. arXiv:2203.03980  [pdf, other

    eess.SP

    Human Biometric Signals Monitoring based on WiFi Channel State Information using Deep Learning

    Authors: Moyu Liu, Zihuai Lin, Pei Xiao, Wei Xiang

    Abstract: In this paper, we first present a single-input, multiple-output convolutional neural network that can estimate both heart rate and respiration rate simultaneously by exploiting the underlying link between heart rate and respiration rate. The inputs to the neural network are the amplitude and phase of channel state information collected by a pair of WiFi devices. Our WiFi-based technique addresses… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.

  28. arXiv:2203.02982  [pdf, other

    cs.CL

    A Survey of Implicit Discourse Relation Recognition

    Authors: Wei Xiang, Bang Wang

    Abstract: A discourse containing one or more sentences describes daily issues and events for people to communicate their thoughts and opinions. As sentences are normally consist of multiple text segments, correct understanding of the theme of a discourse should take into consideration of the relations in between text segments. Although sometimes a connective exists in raw texts for conveying relations, it i… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: IDRRSurvey-LaTeX v1.6, 32 pages with 9 figures

  29. arXiv:2202.01214  [pdf, ps, other

    cs.LG cs.AI eess.SY

    Approximate Bisimulation Relations for Neural Networks and Application to Assured Neural Network Compression

    Authors: Weiming Xiang, Zhongzhu Shao

    Abstract: In this paper, we propose a concept of approximate bisimulation relation for feedforward neural networks. In the framework of approximate bisimulation relation, a novel neural network merging method is developed to compute the approximate bisimulation error between two neural networks based on reachability analysis of neural networks. The developed method is able to quantitatively measure the dist… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

  30. DDU-Net: Dual-Decoder-U-Net for Road Extraction Using High-Resolution Remote Sensing Images

    Authors: Ying Wang, Yuexing Peng, Xinran Liu, Wei Li, George C. Alexandropoulos, Junchuan Yu, Daqing Ge, Wei Xiang

    Abstract: Extracting roads from high-resolution remote sensing images (HRSIs) is vital in a wide variety of applications, such as autonomous driving, path planning, and road navigation. Due to the long and thin shape as well as the shades induced by vegetation and buildings, small-sized roads are more difficult to discern. In order to improve the reliability and accuracy of small-sized road extraction when… ▽ More

    Submitted 18 January, 2022; originally announced January 2022.

  31. arXiv:2112.11703  [pdf, ps, other

    math.DG

    The finite time blow-up of the Yang-Mills flow

    Authors: Wang Guan Xiang, Zhang Chuan **g

    Abstract: In this paper, we shall prove that, on a non-flat Riemannian vector bundle over a compact Riemannian manifold, the smooth solution of the Yang-Mills flow will blow up in finite time if the energy of the initial connection is small enough. We also consider the finite time blow up for the Yang-Mills flow with the initial curvature near the harmonic form. Furthermore, when $E$ is a holomorphic vector… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

  32. arXiv:2111.02036  [pdf, other

    cs.IR cs.MM

    GRCN: Graph-Refined Convolutional Network for Multimedia Recommendation with Implicit Feedback

    Authors: Wei Yinwei, Wang Xiang, Nie Liqiang, He Xiangnan, Chua Tat-Seng

    Abstract: Reorganizing implicit feedback of users as a user-item interaction graph facilitates the applications of graph convolutional networks (GCNs) in recommendation tasks. In the interaction graph, edges between user and item nodes function as the main element of GCNs to perform information propagation and generate informative representations. Nevertheless, an underlying challenge lies in the quality of… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  33. arXiv:2110.14925  [pdf, other

    cs.IR cs.MM

    Hierarchical User Intent Graph Network forMultimedia Recommendation

    Authors: Wei Yinwei, Wang Xiang, He Xiangnan, Nie Liqiang, Rui Yong, Chua Tat-Seng

    Abstract: In this work, we aim to learn multi-level user intents from the co-interacted patterns of items, so as to obtain high-quality representations of users and items and further enhance the recommendation performance. Towards this end, we develop a novel framework, Hierarchical User Intent Graph Network, which exhibits user intents in a hierarchical graph structure, from the fine-grained to coarse-grai… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  34. arXiv:2110.10854  [pdf, ps, other

    cs.IT

    Performance Analysis for Covert Communications Under Faster-than-Nyquist Signaling

    Authors: Yuan Li, Yuchen Zhang, Wanyu Xiang, Jianquan Wang, Sa Xiao, Liang Chang, Wanbin Tang

    Abstract: In this letter, we analyze the performance of covert communications under faster-than-Nyquist (FTN) signaling in the Rayleigh block fading channel. Both Bayesian criterion- and Kullback-Leibler (KL) divergence-based covertness constraints are considered. Especially, for KL divergence-based one, we prove that both the maximum transmit power and covert rate under FTN signaling are higher than those… ▽ More

    Submitted 17 January, 2022; v1 submitted 20 October, 2021; originally announced October 2021.

    Comments: We have corrected the typos and inappropriate description throughout the paper as reviewers suggested. We have proved the superiority of FTN signaling on covert communications with the same detection time duration at Willie in Theorem 3 and renewed the simulation results in Section V as Reviewer 2 suggested. This paper has been resubmitted to IEEE Communications Letters on 14-Jan-2022

  35. arXiv:2110.09903  [pdf, other

    cs.CV

    Unrestricted Adversarial Attacks on ImageNet Competition

    Authors: Yuefeng Chen, Xiaofeng Mao, Yuan He, Hui Xue, Chao Li, Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Fangcheng Liu, Chao Zhang, Hongyang Zhang, Yichi Zhang, Shilong Liu, Chang Liu, Wenzhao Xiang, Yajie Wang, Huipeng Zhou, Haoran Lyu, Yidan Xu, Zixuan Xu, Taoyu Zhu , et al. (13 additional authors not shown)

    Abstract: Many works have investigated the adversarial attacks or defenses under the settings where a bounded and imperceptible perturbation can be added to the input. However in the real-world, the attacker does not need to comply with this restriction. In fact, more threats to the deep model come from unrestricted adversarial examples, that is, the attacker makes large and visible modifications on the ima… ▽ More

    Submitted 25 October, 2021; v1 submitted 17 October, 2021; originally announced October 2021.

    Comments: CVPR-2021 AIC Phase VI Track2: Unrestricted Adversarial Attacks on ImageNet

  36. arXiv:2110.08256  [pdf, other

    cs.LG cs.CR

    Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial Robustness

    Authors: Xiao Yang, Yinpeng Dong, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu

    Abstract: The vulnerability of deep neural networks to adversarial examples has motivated an increasing number of defense strategies for promoting model robustness. However, the progress is usually hampered by insufficient robustness evaluations. As the de facto standard to evaluate adversarial robustness, adversarial attacks typically solve an optimization problem of crafting adversarial examples with an i… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  37. arXiv:2110.08042  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Adversarial Attacks on ML Defense Models Competition

    Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Jiayu Tang, Yuefeng Chen, XiaoFeng Mao, Yuan He, Hui Xue, Chao Li, Ye Liu, Qilong Zhang, Lianli Gao, Yunrui Yu, Xitong Gao, Zhe Zhao, Daquan Lin, Jiadong Lin, Chuanbiao Song, Zihao Wang, Zhennan Wu, Yang Guo , et al. (3 additional authors not shown)

    Abstract: Due to the vulnerability of deep neural networks (DNNs) to adversarial examples, a large number of defense techniques have been proposed to alleviate this problem in recent years. However, the progress of building more robust models is usually hampered by the incomplete or incorrect robustness evaluation. To accelerate the research on reliable evaluation of adversarial robustness of the current de… ▽ More

    Submitted 15 October, 2021; originally announced October 2021.

    Comments: Competition Report

  38. Tracking the national and regional COVID-19 epidemic status in the UK using directed Principal Component Analysis

    Authors: Ben Swallow, Wen Xiang, Jasmina Panovska-Griffiths

    Abstract: One of the difficulties in monitoring an ongoing pandemic is deciding on the metric that best describes its status when multiple intercorrelated measurements are available. Having a single measure, such as the effective reproduction number R, has been a simple and useful metric for tracking the epidemic and for imposing policy interventions to curb the increase when R >1. While R is easy to interp… ▽ More

    Submitted 10 March, 2022; v1 submitted 3 October, 2021; originally announced October 2021.

  39. arXiv:2109.15177  [pdf, other

    cs.CV cs.AI

    You Cannot Easily Catch Me: A Low-Detectable Adversarial Patch for Object Detectors

    Authors: Zijian Zhu, Hang Su, Chang Liu, Wenzhao Xiang, Shibao Zheng

    Abstract: Blind spots or outright deceit can bedevil and deceive machine learning models. Unidentified objects such as digital "stickers," also known as adversarial patches, can fool facial recognition systems, surveillance systems and self-driving cars. Fortunately, most existing adversarial patches can be outwitted, disabled and rejected by a simple classification network called an adversarial patch detec… ▽ More

    Submitted 30 September, 2021; originally announced September 2021.

  40. arXiv:2109.05820  [pdf, other

    cs.CV cs.LG

    Improving the Robustness of Adversarial Attacks Using an Affine-Invariant Gradient Estimator

    Authors: Wenzhao Xiang, Hang Su, Chang Liu, Yandong Guo, Shibao Zheng

    Abstract: As designers of artificial intelligence try to outwit hackers, both sides continue to hone in on AI's inherent vulnerabilities. Designed and trained from certain statistical distributions of data, AI's deep neural networks (DNNs) remain vulnerable to deceptive inputs that violate a DNN's statistical, predictive assumptions. Before being fed into a neural network, however, most existing adversarial… ▽ More

    Submitted 22 April, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

  41. arXiv:2108.12313  [pdf, other

    cs.CV cs.AI

    TE-YOLOF: Tiny and efficient YOLOF for blood cell detection

    Authors: Fanxin Xu, Xiangkui Li, Hang Yang, Yali Wang, Wei Xiang

    Abstract: Blood cell detection in microscopic images is an essential branch of medical image processing research. Since disease detection based on manual checking of blood cells is time-consuming and full of errors, testing of blood cells using object detectors with Deep Convolutional Neural Network can be regarded as a feasible solution. In this work, an object detector based on YOLOF has been proposed to… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

  42. arXiv:2108.11032  [pdf, other

    cs.CV cs.AI cs.LG

    Improving Visual Quality of Unrestricted Adversarial Examples with Wavelet-VAE

    Authors: Wenzhao Xiang, Chang Liu, Shibao Zheng

    Abstract: Traditional adversarial examples are typically generated by adding perturbation noise to the input image within a small matrix norm. In practice, un-restricted adversarial attack has raised great concern and presented a new threat to the AI safety. In this paper, we propose a wavelet-VAE structure to reconstruct an input image and generate adversarial examples by modifying the latent code. Differe… ▽ More

    Submitted 24 August, 2021; originally announced August 2021.

  43. arXiv:2108.09207  [pdf, ps, other

    math.AP

    Persistence of the steady planar normal shock structure in 3-D unsteady potential flows

    Authors: Beixiang Fang, Feimin Huang, Wei Xiang, Feng Xiao

    Abstract: This paper concerns the dynamic stability of the steady 3-D wave structure of a planar normal shock front intersecting perpendicularly to a planar solid wall for unsteady potential flows. The stability problem can be formulated as a free boundary problem of a quasi-linear hyperbolic equation of second order in a dihedral-space domain between the shock front and the solid wall. The key difficulty i… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

  44. arXiv:2108.05061  [pdf, other

    cs.CV cs.AI

    NI-UDA: Graph Adversarial Domain Adaptation from Non-shared-and-Imbalanced Big Data to Small Imbalanced Applications

    Authors: Guangyi Xiao, Weiwei Xiang, Huan Liu, Hao Chen, Shun Peng, **gzhi Guo, Zhiguo Gong

    Abstract: We propose a new general Graph Adversarial Domain Adaptation (GADA) based on semantic knowledge reasoning of class structure for solving the problem of unsupervised domain adaptation (UDA) from the big data with non-shared and imbalanced classes to specified small and imbalanced applications (NI-UDA), where non-shared classes mean the label space out of the target domain. Our goal is to leverage p… ▽ More

    Submitted 11 August, 2021; v1 submitted 11 August, 2021; originally announced August 2021.

    Comments: 11 pages, 5 figures, and 8 tables

  45. arXiv:2107.12801  [pdf, ps, other

    cs.LG math.OC

    Robust Optimization Framework for Training Shallow Neural Networks Using Reachability Method

    Authors: Yejiang Yang, Weiming Xiang

    Abstract: In this paper, a robust optimization framework is developed to train shallow neural networks based on reachability analysis of neural networks. To characterize noises of input data, the input training data is disturbed in the description of interval sets. Interval-based reachability analysis is then performed for the hidden layer. With the reachability analysis results, a robust optimization train… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

  46. arXiv:2107.11725  [pdf, ps, other

    math.AP math-ph physics.flu-dyn

    Convergence Rate of Hypersonic Similarity for Steady Potential Flows Over Two-Dimensional Lipschitz Wedge

    Authors: Jie Kuang, Wei Xiang, Yongqian Zhang

    Abstract: This paper is devoted to establishing the convergence rate of the hypersonic similarity for the inviscid steady irrotational Euler flow over a two-dimensional Lipschitz slender wedge in $BV\cap L^1$ space. The rate we established is the same as the one predicted by Newtonian-Busemann law (see (3.29) in \cite[Page 67]{anderson} for more details)as the incoming Mach number… ▽ More

    Submitted 25 July, 2021; originally announced July 2021.

  47. arXiv:2105.14113  [pdf, ps, other

    math.OC eess.SY

    Necessary and Sufficient Conditions for Stability of Discrete-Time Switched Linear Systems with Ranged Dwell Time

    Authors: Weiming Xiang

    Abstract: This paper deals with the stability analysis problem of discrete-time switched linear systems with ranged dwell time. A novel concept called L-switching-cycle is proposed, which contains sequences of multiple activation cycles satisfying the prescribed ranged dwell time constraint. Based on L-switching-cycle, two sufficient conditions are proposed to ensure the global uniform asymptotic stability… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  48. arXiv:2105.09683  [pdf, other

    eess.IV cs.CV

    DPN-SENet:A self-attention mechanism neural network for detection and diagnosis of COVID-19 from chest x-ray images

    Authors: Bo Cheng, Ruhui Xue, Hang Yang, Laili Zhu, Wei Xiang

    Abstract: Background and Objective: The new type of coronavirus is also called COVID-19. It began to spread at the end of 2019 and has now spread across the world. Until October 2020, It has infected around 37 million people and claimed about 1 million lives. We propose a deep learning model that can help radiologists and clinicians use chest X-rays to diagnose COVID-19 cases and show the diagnostic feature… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

    Comments: 11 pages, 7 figures

  49. arXiv:2105.09596  [pdf, other

    cs.CV cs.AI

    AGSFCOS: Based on attention mechanism and Scale-Equalizing pyramid network of object detection

    Authors: Li Wang, Wei Xiang, Ruhui Xue, Kaida Zou, Laili Zhu

    Abstract: Recently, the anchor-free object detection model has shown great potential for accuracy and speed to exceed anchor-based object detection. Therefore, two issues are mainly studied in this article: (1) How to let the backbone network in the anchor-free object detection model learn feature extraction? (2) How to make better use of the feature pyramid network? In order to solve the above problems, Ex… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

    Comments: 9 pages,9 figures

  50. Denoising Higher-order Moments for Blind Digital Modulation Identification in Multiple-antenna Systems

    Authors: Sofiane Kharbech, Eric Pierre Simon, Akram Belazi, Wei Xiang

    Abstract: The paper proposes a new technique that substantially improves blind digital modulation identification (DMI) algorithms that are based on higher-order statistics (HOS). The proposed technique takes advantage of noise power estimation to make an offset on higher-order moments (HOM), thus getting an estimate of noise-free HOM. When tested for multiple-antenna systems, the proposed method outperforms… ▽ More

    Submitted 20 February, 2021; originally announced February 2021.

    Journal ref: IEEE Wireless Communications Letters, vol. 9, no. 6, pp. 765-769, June 2020