Skip to main content

Showing 1–50 of 71 results for author: Juefei-Xu, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11021  [pdf, other

    cs.CV

    $α$-SSC: Uncertainty-Aware Camera-based 3D Semantic Scene Completion

    Authors: Sanbao Su, Nuo Chen, Felix Juefei-Xu, Chen Feng, Fei Miao

    Abstract: In the realm of autonomous vehicle (AV) perception, comprehending 3D scenes is paramount for tasks such as planning and map**. Semantic scene completion (SSC) aims to infer scene geometry and semantics from limited observations. While camera-based SSC has gained popularity due to affordability and rich visual cues, existing methods often neglect the inherent uncertainty in models. To address thi… ▽ More

    Submitted 21 June, 2024; v1 submitted 16 June, 2024; originally announced June 2024.

    Comments: 12 pages, 4 figures

  2. arXiv:2406.06089  [pdf, other

    cs.CV

    Texture Re-scalable Universal Adversarial Perturbation

    Authors: Yihao Huang, Qing Guo, Felix Juefei-Xu, Ming Hu, Xiaojun Jia, Xiaochun Cao, Geguang Pu, Yang Liu

    Abstract: Universal adversarial perturbation (UAP), also known as image-agnostic perturbation, is a fixed perturbation map that can fool the classifier with high probabilities on arbitrary images, making it more practical for attacking deep models in the real world. Previous UAP methods generate a scale-fixed and texture-fixed perturbation map for all images, which ignores the multi-scale objects in images… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: 14 pages (accepted by TIFS2024)

  3. arXiv:2405.21050  [pdf, other

    cs.CV cs.LG

    Spectrum-Aware Parameter Efficient Fine-Tuning for Diffusion Models

    Authors: Xinxi Zhang, Song Wen, Ligong Han, Felix Juefei-Xu, Akash Srivastava, Junzhou Huang, Hao Wang, Molei Tao, Dimitris N. Metaxas

    Abstract: Adapting large-scale pre-trained generative models in a parameter-efficient manner is gaining traction. Traditional methods like low rank adaptation achieve parameter efficiency by imposing constraints but may not be optimal for tasks requiring high representation capacity. We propose a novel spectrum-aware adaptation framework for generative models. Our method adjusts both singular values and the… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  4. arXiv:2405.18071  [pdf, other

    cs.CV

    Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

    Authors: Di Yang, Yihao Huang, Qing Guo, Felix Juefei-Xu, Xiaojun Jia, Run Wang, Geguang Pu, Yang Liu

    Abstract: The widespread use of diffusion methods enables the creation of highly realistic images on demand, thereby posing significant risks to the integrity and safety of online information and highlighting the necessity of DeepFake detection. Our analysis of features extracted by traditional image encoders reveals that both low-level and high-level features offer distinct advantages in identifying DeepFa… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  5. arXiv:2405.14189  [pdf, other

    cs.CL cs.CV

    Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs

    Authors: Yihao Huang, Chong Wang, Xiaojun Jia, Qing Guo, Felix Juefei-Xu, Jian Zhang, Geguang Pu, Yang Liu

    Abstract: With the rising popularity of Large Language Models (LLMs), assessing their trustworthiness through security tasks has gained critical importance. Regarding the new task of universal goal hijacking, previous efforts have concentrated solely on optimization algorithms, overlooking the crucial role of the prompt. To fill this gap, we propose a universal goal hijacking method called POUGH that incorp… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 15 pages

  6. arXiv:2404.12241  [pdf, other

    cs.CL cs.AI

    Introducing v0.5 of the AI Safety Benchmark from MLCommons

    Authors: Bertie Vidgen, Adarsh Agrawal, Ahmed M. Ahmed, Victor Akinwande, Namir Al-Nuaimi, Najla Alfaraj, Elie Alhajjar, Lora Aroyo, Trupti Bavalatti, Max Bartolo, Borhane Blili-Hamelin, Kurt Bollacker, Rishi Bomassani, Marisa Ferrara Boston, Siméon Campos, Kal Chakra, Canyu Chen, Cody Coleman, Zacharie Delpierre Coudert, Leon Derczynski, Debojyoti Dutta, Ian Eisenberg, James Ezick, Heather Frase, Brian Fuller , et al. (75 additional authors not shown)

    Abstract: This paper introduces v0.5 of the AI Safety Benchmark, which has been created by the MLCommons AI Safety Working Group. The AI Safety Benchmark has been designed to assess the safety risks of AI systems that use chat-tuned language models. We introduce a principled approach to specifying and constructing the benchmark, which for v0.5 covers only a single use case (an adult chatting to a general-pu… ▽ More

    Submitted 13 May, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

  7. arXiv:2404.12104  [pdf, other

    cs.CV cs.CL cs.LG

    Ethical-Lens: Curbing Malicious Usages of Open-Source Text-to-Image Models

    Authors: Yuzhu Cai, Sheng Yin, Yuxi Wei, Chenxin Xu, Weibo Mao, Felix Juefei-Xu, Siheng Chen, Yanfeng Wang

    Abstract: The burgeoning landscape of text-to-image models, exemplified by innovations such as Midjourney and DALLE 3, has revolutionized content creation across diverse sectors. However, these advancements bring forth critical ethical concerns, particularly with the misuse of open-source models to generate content that violates societal norms. Addressing this, we introduce Ethical-Lens, a framework designe… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: 42 pages, 17 figures, 29 tables

  8. arXiv:2404.06247  [pdf, other

    cs.CV

    LRR: Language-Driven Resamplable Continuous Representation against Adversarial Tracking Attacks

    Authors: Jianlang Chen, Xuhong Ren, Qing Guo, Felix Juefei-Xu, Di Lin, Wei Feng, Lei Ma, Jianjun Zhao

    Abstract: Visual object tracking plays a critical role in visual-based autonomous systems, as it aims to estimate the position and size of the object of interest within a live video. Despite significant progress made in this field, state-of-the-art (SOTA) trackers often fail when faced with adversarial perturbations in the incoming frames. This can lead to significant robustness and security issues when the… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  9. arXiv:2404.04804  [pdf, other

    cs.CV

    Light the Night: A Multi-Condition Diffusion Framework for Unpaired Low-Light Enhancement in Autonomous Driving

    Authors: **long Li, Baolu Li, Zhengzhong Tu, Xinyu Liu, Qing Guo, Felix Juefei-Xu, Runsheng Xu, Hongkai Yu

    Abstract: Vision-centric perception systems for autonomous driving have gained considerable attention recently due to their cost-effectiveness and scalability, especially compared to LiDAR-based systems. However, these systems often struggle in low-light conditions, potentially compromising their performance and safety. To address this, our paper introduces LightDiff, a domain-tailored framework designed to… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: This paper is accepted by CVPR 2024

  10. arXiv:2403.18554  [pdf, other

    cs.CV

    CosalPure: Learning Concept from Group Images for Robust Co-Saliency Detection

    Authors: Jiayi Zhu, Qing Guo, Felix Juefei-Xu, Yihao Huang, Yang Liu, Geguang Pu

    Abstract: Co-salient object detection (CoSOD) aims to identify the common and salient (usually in the foreground) regions across a given group of images. Although achieving significant progress, state-of-the-art CoSODs could be easily affected by some adversarial perturbations, leading to substantial accuracy reduction. The adversarial perturbations can mislead CoSODs but do not change the high-level semant… ▽ More

    Submitted 11 April, 2024; v1 submitted 27 March, 2024; originally announced March 2024.

    Comments: This paper is accepted by CVPR 2024

  11. arXiv:2402.02738  [pdf, other

    cs.CV cs.LG

    Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective

    Authors: Yihao Huang, Kaiyuan Yu, Qing Guo, Felix Juefei-Xu, Xiaojun Jia, Tianlin Li, Geguang Pu, Yang Liu

    Abstract: In recent years, LiDAR-camera fusion models have markedly advanced 3D object detection tasks in autonomous driving. However, their robustness against common weather corruption such as fog, rain, snow, and sunlight in the intricate physical world remains underexplored. In this paper, we evaluate the robustness of fusion models from the perspective of fusion strategies on the corrupted dataset. Base… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 17 pages

  12. arXiv:2401.17499  [pdf, other

    cs.CV

    AdvGPS: Adversarial GPS for Multi-Agent Perception Attack

    Authors: **long Li, Baolu Li, Xinyu Liu, Jianwu Fang, Felix Juefei-Xu, Qing Guo, Hongkai Yu

    Abstract: The multi-agent perception system collects visual data from sensors located on various agents and leverages their relative poses determined by GPS signals to effectively fuse information, mitigating the limitations of single-agent sensing, such as occlusion. However, the precision of GPS signals can be influenced by a range of factors, including wireless transmission and obstructions like building… ▽ More

    Submitted 20 February, 2024; v1 submitted 30 January, 2024; originally announced January 2024.

    Comments: Accepted by the 2024 IEEE International Conference on Robotics and Automation (ICRA)

  13. arXiv:2310.14211  [pdf, other

    cs.LG cs.AI cs.CL cs.CR cs.SE

    LUNA: A Model-Based Universal Analysis Framework for Large Language Models

    Authors: Da Song, Xuan Xie, Jiayang Song, Derui Zhu, Yuheng Huang, Felix Juefei-Xu, Lei Ma

    Abstract: Over the past decade, Artificial Intelligence (AI) has had great success recently and is being used in a wide range of academic and industrial fields. More recently, LLMs have made rapid advancements that have propelled AI to a new level, enabling even more diverse applications and industrial domains with intelligence, particularly in areas like software engineering and natural language processing… ▽ More

    Submitted 13 June, 2024; v1 submitted 22 October, 2023; originally announced October 2023.

    Comments: 34 pages, 13 figures, To appear in Transactions on Software Engineering (Journal First)

  14. arXiv:2308.15742  [pdf, other

    cs.SD cs.AI cs.SE eess.AS

    ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers

    Authors: Yi Liu, Yuekang Li, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu

    Abstract: The popularity of automatic speech recognition (ASR) systems nowadays leads to an increasing need for improving their accessibility. Handling stuttering speech is an important feature for accessible ASR systems. To improve the accessibility of ASR systems for stutterers, we need to expose and analyze the failures of ASR systems on stuttering speech. The speech datasets recorded from stutterers are… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

  15. arXiv:2308.06515  [pdf, other

    cs.CV cs.DC

    Seed Feature Maps-based CNN Models for LEO Satellite Remote Sensing Services

    Authors: Zhichao Lu, Chuntao Ding, Shangguang Wang, Ran Cheng, Felix Juefei-Xu, Vishnu Naresh Boddeti

    Abstract: Deploying high-performance convolutional neural network (CNN) models on low-earth orbit (LEO) satellites for rapid remote sensing image processing has attracted significant interest from industry and academia. However, the limited resources available on LEO satellites contrast with the demands of resource-intensive CNN models, necessitating the adoption of ground-station server assistance for trai… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

    Comments: 11 pages

  16. arXiv:2307.10236  [pdf, other

    cs.SE cs.AI cs.CL

    Look Before You Leap: An Exploratory Study of Uncertainty Measurement for Large Language Models

    Authors: Yuheng Huang, Jiayang Song, Zhijie Wang, Shengming Zhao, Huaming Chen, Felix Juefei-Xu, Lei Ma

    Abstract: The recent performance leap of Large Language Models (LLMs) opens up new opportunities across numerous industrial applications and domains. However, erroneous generations, such as false predictions, misinformation, and hallucination made by LLMs, have also raised severe concerns for the trustworthiness of LLMs', especially in safety-, security- and reliability-sensitive scenarios, potentially hind… ▽ More

    Submitted 17 October, 2023; v1 submitted 16 July, 2023; originally announced July 2023.

    Comments: 20 pages, 4 figures

  17. arXiv:2305.16220  [pdf, other

    cs.CV

    On the Robustness of Segment Anything

    Authors: Yihao Huang, Yue Cao, Tianlin Li, Felix Juefei-Xu, Di Lin, Ivor W. Tsang, Yang Liu, Qing Guo

    Abstract: Segment anything model (SAM) has presented impressive objectness identification capability with the idea of prompt learning and a new collected large-scale dataset. Given a prompt (e.g., points, bounding boxes, or masks) and an input image, SAM is able to generate valid segment masks for all objects indicated by the prompts, presenting high generalization across diverse scenarios and being a gener… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

    Comments: 22 pages

  18. arXiv:2305.10929  [pdf, other

    cs.CV

    Architecture-agnostic Iterative Black-box Certified Defense against Adversarial Patches

    Authors: Di Yang, Yihao Huang, Qing Guo, Felix Juefei-Xu, Ming Hu, Yang Liu, Geguang Pu

    Abstract: The adversarial patch attack aims to fool image classifiers within a bounded, contiguous region of arbitrary changes, posing a real threat to computer vision systems (e.g., autonomous driving, content moderation, biometric authentication, medical imaging) in the physical world. To address this problem in a trustworthy way, proposals have been made for certified patch defenses that ensure the robus… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

    Comments: 9 pages

  19. arXiv:2305.10701  [pdf, other

    cs.CV

    Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models

    Authors: Yihao Huang, Felix Juefei-Xu, Qing Guo, Jie Zhang, Yutong Wu, Ming Hu, Tianlin Li, Geguang Pu, Yang Liu

    Abstract: Although recent personalization methods have democratized high-resolution image synthesis by enabling swift concept acquisition with minimal examples and lightweight computation, they also present an exploitable avenue for high accessible backdoor attacks. This paper investigates a critical and unexplored aspect of text-to-image (T2I) diffusion models - their potential vulnerability to backdoor at… ▽ More

    Submitted 20 December, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

    Comments: 16 pages, accepted by AAAI 2024

  20. arXiv:2303.09495  [pdf, other

    cs.RO cs.AI cs.CV cs.MA

    Among Us: Adversarially Robust Collaborative Perception by Consensus

    Authors: Yiming Li, Qi Fang, Jiamu Bai, Siheng Chen, Felix Juefei-Xu, Chen Feng

    Abstract: Multiple robots could perceive a scene (e.g., detect objects) collaboratively better than individuals, although easily suffer from adversarial attacks when using deep learning. This could be addressed by the adversarial defense, but its training requires the often-unknown attacking mechanism. Differently, we propose ROBOSAC, a novel sampling-based defense strategy generalizable to unseen attackers… ▽ More

    Submitted 17 August, 2023; v1 submitted 16 March, 2023; originally announced March 2023.

    Comments: Accepted by ICCV 2023

  21. arXiv:2302.07734  [pdf, other

    cs.CV cs.DC cs.LG

    TFormer: A Transmission-Friendly ViT Model for IoT Devices

    Authors: Zhichao Lu, Chuntao Ding, Felix Juefei-Xu, Vishnu Naresh Boddeti, Shangguang Wang, Yun Yang

    Abstract: Deploying high-performance vision transformer (ViT) models on ubiquitous Internet of Things (IoT) devices to provide high-quality vision services will revolutionize the way we live, work, and interact with the world. Due to the contradiction between the limited resources of IoT devices and resource-intensive ViT models, the use of cloud servers to assist ViT model training has become mainstream. H… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

    Comments: IEEE Transactions on Parallel and Distributed Systems

  22. arXiv:2210.05896  [pdf, other

    cs.CV cs.LG cs.RO

    Common Corruption Robustness of Point Cloud Detectors: Benchmark and Enhancement

    Authors: Shuangzhi Li, Zhijie Wang, Felix Juefei-Xu, Qing Guo, Xingyu Li, Lei Ma

    Abstract: Object detection through LiDAR-based point cloud has recently been important in autonomous driving. Although achieving high accuracy on public benchmarks, the state-of-the-art detectors may still go wrong and cause a heavy loss due to the widespread corruptions in the real world like rain, snow, sensor noise, etc. Nevertheless, there is a lack of a large-scale dataset covering diverse scenes and r… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: 16 pages, 6 figures

  23. DARTSRepair: Core-failure-set Guided DARTS for Network Robustness to Common Corruptions

    Authors: Xuhong Ren, Jianlang Chen, Felix Juefei-Xu, Wanli Xue, Qing Guo, Lei Ma, Jianjun Zhao, Shengyong Chen

    Abstract: Network architecture search (NAS), in particular the differentiable architecture search (DARTS) method, has shown a great power to learn excellent model architectures on the specific dataset of interest. In contrast to using a fixed dataset, in this work, we focus on a different but important scenario for NAS: how to refine a deployed network's model architecture to enhance its robustness with the… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: To appear in Pattern Recognition (PR)

  24. Towards Transmission-Friendly and Robust CNN Models over Cloud and Device

    Authors: Chuntao Ding, Zhichao Lu, Felix Juefei-Xu, Vishnu Naresh Boddeti, Yidong Li, Jiannong Cao

    Abstract: Deploying deep convolutional neural network (CNN) models on ubiquitous Internet of Things (IoT) devices has attracted much attention from industry and academia since it greatly facilitates our lives by providing various rapid-response services. Due to the limited resources of IoT devices, cloud-assisted training of CNN models has become the mainstream. However, most existing related works suffer f… ▽ More

    Submitted 13 December, 2022; v1 submitted 19 July, 2022; originally announced July 2022.

    Comments: IEEE Transactions on Mobile Computing

  25. arXiv:2203.12915  [pdf, other

    cs.LG cs.CV cs.SE

    NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks

    Authors: Xiaofei Xie, Tianlin Li, Jian Wang, Lei Ma, Qing Guo, Felix Juefei-Xu, Yang Liu

    Abstract: Deep learning has recently been widely applied to many applications across different domains, e.g., image classification and audio recognition. However, the quality of Deep Neural Networks (DNNs) still raises concerns in the practical operational environment, which calls for systematic testing, especially in safety-critical scenarios. Inspired by software testing, a number of structural coverage c… ▽ More

    Submitted 26 March, 2022; v1 submitted 24 March, 2022; originally announced March 2022.

    Comments: 27 pages. Accepted to ACM Transactions on Software Engineering and Methodology (TOSEM), 2022

  26. arXiv:2201.06427  [pdf, other

    cs.CV cs.AI

    Masked Faces with Faced Masks

    Authors: Jiayi Zhu, Qing Guo, Felix Juefei-Xu, Yihao Huang, Yang Liu, Geguang Pu

    Abstract: Modern face recognition systems (FRS) still fall short when the subjects are wearing facial masks, a common theme in the age of respiratory pandemics. An intuitive partial remedy is to add a mask detector to flag any masked faces so that the FRS can act accordingly for those low-confidence masked faces. In this work, we set out to investigate the potential vulnerability of such FRS equipped with a… ▽ More

    Submitted 12 April, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: 8 pages

  27. arXiv:2201.06070  [pdf, other

    cs.CV cs.AI

    ALA: Naturalness-aware Adversarial Lightness Attack

    Authors: Yihao Huang, Liangru Sun, Qing Guo, Felix Juefei-Xu, Jiayi Zhu, **cao Feng, Yang Liu, Geguang Pu

    Abstract: Most researchers have tried to enhance the robustness of DNNs by revealing and repairing the vulnerability of DNNs with specialized adversarial examples. Parts of the attack examples have imperceptible perturbations restricted by Lp norm. However, due to their high-frequency property, the adversarial examples can be defended by denoising methods and are hard to realize in the physical world. To av… ▽ More

    Submitted 28 May, 2024; v1 submitted 16 January, 2022; originally announced January 2022.

    Comments: 9 pages

  28. arXiv:2201.02366  [pdf, other

    cs.CV eess.IV

    Uncertainty-Aware Cascaded Dilation Filtering for High-Efficiency Deraining

    Authors: Qing Guo, **gyang Sun, Felix Juefei-Xu, Lei Ma, Di Lin, Wei Feng, Song Wang

    Abstract: Deraining is a significant and fundamental computer vision task, aiming to remove the rain streaks and accumulations in an image or video captured under a rainy day. Existing deraining methods usually make heuristic assumptions of the rain model, which compels them to employ complex optimization or iterative refinement for high recovery quality. This, however, leads to time-consuming methods and a… ▽ More

    Submitted 7 January, 2022; originally announced January 2022.

    Comments: 14 pages, 10 figures, 10 tables. This is the extention of our conference version https://github.com/tsingqguo/efficientderain

  29. arXiv:2111.13790  [pdf, other

    cs.CV

    Benchmarking Shadow Removal for Facial Landmark Detection and Beyond

    Authors: Lan Fu, Qing Guo, Felix Juefei-Xu, Hongkai Yu, Wei Feng, Yang Liu, Song Wang

    Abstract: Facial landmark detection is a very fundamental and significant vision task with many important applications. In practice, facial landmark detection can be affected by a lot of natural degradations. One of the most common and important degradations is the shadow caused by light source blocking. While many advanced shadow removal methods have been proposed to recover the image quality in recent yea… ▽ More

    Submitted 26 November, 2021; originally announced November 2021.

  30. arXiv:2111.13330  [pdf, other

    cs.LG cs.AI cs.CV

    ArchRepair: Block-Level Architecture-Oriented Repairing for Deep Neural Networks

    Authors: Hua Qi, Zhijie Wang, Qing Guo, Jianlang Chen, Felix Juefei-Xu, Lei Ma, Jianjun Zhao

    Abstract: Over the past few years, deep neural networks (DNNs) have achieved tremendous success and have been continuously applied in many application domains. However, during the practical deployment in the industrial tasks, DNNs are found to be erroneous-prone due to various reasons such as overfitting, lacking robustness to real-world corruptions during practical usage. To address these challenges, many… ▽ More

    Submitted 11 December, 2021; v1 submitted 26 November, 2021; originally announced November 2021.

    Comments: 33 pages, 7 figures

  31. arXiv:2111.12971  [pdf, other

    cs.CV

    Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network

    Authors: Yihao Huang, Felix Juefei-Xu, Qing Guo, Geguang Pu, Yang Liu

    Abstract: Bokeh effect is a natural shallow depth-of-field phenomenon that blurs the out-of-focus part in photography. In recent years, a series of works have proposed automatic and realistic bokeh rendering methods for artistic and aesthetic purposes. They usually employ cutting-edge data-driven deep generative networks with complex training strategies and network architectures. However, these works neglec… ▽ More

    Submitted 29 November, 2023; v1 submitted 25 November, 2021; originally announced November 2021.

    Comments: 11 pages, accepted by TMM

  32. arXiv:2108.07920  [pdf, other

    cs.CV

    Adversarial Relighting Against Face Recognition

    Authors: Qian Zhang, Qing Guo, Ruijun Gao, Felix Juefei-Xu, Hongkai Yu, Wei Feng

    Abstract: Deep face recognition (FR) has achieved significantly high accuracy on several challenging datasets and fosters successful real-world applications, even showing high robustness to the illumination variation that is usually regarded as a main threat to the FR system. However, in the real world, illumination variation caused by diverse lighting conditions cannot be fully covered by the limited face… ▽ More

    Submitted 26 August, 2022; v1 submitted 17 August, 2021; originally announced August 2021.

  33. arXiv:2107.13452  [pdf, other

    cs.CV cs.GR

    CarveNet: Carving Point-Block for Complex 3D Shape Completion

    Authors: Qing Guo, Zhijie Wang, Felix Juefei-Xu, Di Lin, Lei Ma, Wei Feng, Yang Liu

    Abstract: 3D point cloud completion is very challenging because it heavily relies on the accurate understanding of the complex 3D shapes (e.g., high-curvature, concave/convex, and hollowed-out 3D shapes) and the unknown & diverse patterns of the partially available point clouds. In this paper, we propose a novel solution,i.e., Point-block Carving (PC), for completing the complex 3D point cloud completion. G… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Comments: 10 pages and 10 figures

  34. arXiv:2107.12085  [pdf, other

    cs.CV cs.AI

    Learning to Adversarially Blur Visual Object Tracking

    Authors: Qing Guo, Ziyi Cheng, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yang Liu, Jianjun Zhao

    Abstract: Motion blur caused by the moving of the object or camera during the exposure can be a key challenge for visual object tracking, affecting tracking accuracy significantly. In this work, we explore the robustness of visual object trackers against motion blur from a new angle, i.e., adversarial blur attack (ABA). Our main objective is to online transfer input frames to their natural motion-blurred co… ▽ More

    Submitted 28 October, 2021; v1 submitted 26 July, 2021; originally announced July 2021.

    Comments: This work has been accepted to ICCV 2021

  35. arXiv:2107.06501  [pdf, other

    cs.CV cs.LG eess.IV

    AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning

    Authors: Yihao Huang, Qing Guo, Felix Juefei-Xu, Lei Ma, Weikai Miao, Yang Liu, Geguang Pu

    Abstract: High-level representation-guided pixel denoising and adversarial training are independent solutions to enhance the robustness of CNNs against adversarial attacks by pre-processing input data and re-training models, respectively. Most recently, adversarial training techniques have been widely studied and improved while the pixel denoising-based method is getting less attractive. However, it is stil… ▽ More

    Submitted 18 October, 2021; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: This work has been accepted to ACM-MM 2021

  36. JPGNet: Joint Predictive Filtering and Generative Network for Image Inpainting

    Authors: Qing Guo, Xiaoguang Li, Felix Juefei-Xu, Hongkai Yu, Yang Liu, Song wang

    Abstract: Image inpainting aims to restore the missing regions of corrupted images and make the recovery result identical to the originally complete image, which is different from the common generative task emphasizing the naturalness or realism of generated images. Nevertheless, existing works usually regard it as a pure generation problem and employ cutting-edge deep generative techniques to address it. T… ▽ More

    Submitted 18 October, 2021; v1 submitted 9 July, 2021; originally announced July 2021.

    Comments: This work has been accepted to ACM-MM 2021

  37. arXiv:2105.08269  [pdf, other

    cs.LG cs.CV

    Sparta: Spatially Attentive and Adversarially Robust Activation

    Authors: Qing Guo, Felix Juefei-Xu, Changqing Zhou, Wei Feng, Yang Liu, Song Wang

    Abstract: Adversarial training (AT) is one of the most effective ways for improving the robustness of deep convolution neural networks (CNNs). Just like common network training, the effectiveness of AT relies on the design of basic network components. In this paper, we conduct an in-depth study on the role of the basic ReLU activation component in AT for robust CNNs. We find that the spatially-shared and in… ▽ More

    Submitted 3 December, 2022; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: 25 pages, 5 figures

  38. arXiv:2105.05558  [pdf, other

    eess.IV cs.CV

    AVA: Adversarial Vignetting Attack against Visual Recognition

    Authors: Binyu Tian, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Xiaohong Li, Yang Liu

    Abstract: Vignetting is an inherited imaging phenomenon within almost all optical systems, showing as a radial intensity darkening toward the corners of an image. Since it is a common effect for photography and usually appears as a slight intensity variation, people usually regard it as a part of a photo and would not even want to post-process it. Due to this natural advantage, in this work, we study vignet… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

    Comments: This work has been accepted to IJCAI2021

  39. arXiv:2105.05011  [pdf, other

    cs.CV

    Let There be Light: Improved Traffic Surveillance via Detail Preserving Night-to-Day Transfer

    Authors: Lan Fu, Hongkai Yu, Felix Juefei-Xu, **long Li, Qing Guo, Song Wang

    Abstract: In recent years, image and video surveillance have made considerable progresses to the Intelligent Transportation Systems (ITS) with the help of deep Convolutional Neural Networks (CNNs). As one of the state-of-the-art perception approaches, detecting the interested objects in each frame of video surveillance is widely desired by ITS. Currently, object detection shows remarkable efficiency and rel… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

    Comments: to appear in TCSVT 2021

  40. arXiv:2104.13673  [pdf, other

    cs.CV

    AdvHaze: Adversarial Haze Attack

    Authors: Ruijun Gao, Qing Guo, Felix Juefei-Xu, Hongkai Yu, Wei Feng

    Abstract: In recent years, adversarial attacks have drawn more attention for their value on evaluating and improving the robustness of machine learning models, especially, neural network models. However, previous attack methods have mainly focused on applying some $l^p$ norm-bounded noise perturbations. In this paper, we instead introduce a novel adversarial attack method based on haze, which is a common ph… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

  41. arXiv:2104.11585  [pdf, other

    cs.CV

    DeepMix: Online Auto Data Augmentation for Robust Visual Object Tracking

    Authors: Ziyi Cheng, Xuhong Ren, Felix Juefei-Xu, Wanli Xue, Qing Guo, Lei Ma, Jianjun Zhao

    Abstract: Online updating of the object model via samples from historical frames is of great importance for accurate visual object tracking. Recent works mainly focus on constructing effective and efficient updating methods while neglecting the training samples for learning discriminative object models, which is also a key part of a learning problem. In this paper, we propose the DeepMix that takes historic… ▽ More

    Submitted 2 May, 2021; v1 submitted 23 April, 2021; originally announced April 2021.

    Comments: 6 pages, 2 figures. This work has been accepted to ICME 2021

  42. arXiv:2103.15326  [pdf, other

    cs.CV

    Fooling LiDAR Perception via Adversarial Trajectory Perturbation

    Authors: Yiming Li, Congcong Wen, Felix Juefei-Xu, Chen Feng

    Abstract: LiDAR point clouds collected from a moving vehicle are functions of its trajectories, because the sensor motion needs to be compensated to avoid distortions. When autonomous vehicles are sending LiDAR point clouds to deep networks for perception and planning, could the motion compensation consequently become a wide-open backdoor in those networks, due to both the adversarial vulnerability of deep… ▽ More

    Submitted 30 July, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: 2021 IEEE International Conference on Computer Vision (ICCV) [Oral Presentation]

  43. arXiv:2103.01255  [pdf, other

    cs.CV

    Auto-Exposure Fusion for Single-Image Shadow Removal

    Authors: Lan Fu, Changqing Zhou, Qing Guo, Felix Juefei-Xu, Hongkai Yu, Wei Feng, Yang Liu, Song Wang

    Abstract: Shadow removal is still a challenging task due to its inherent background-dependent and spatial-variant properties, leading to unknown and diverse shadow patterns. Even powerful state-of-the-art deep neural networks could hardly recover traceless shadow-removed background. This paper proposes a new solution for this task by formulating it as an exposure fusion problem to address the challenges. In… ▽ More

    Submitted 12 April, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: accepted to cvpr2021, code is available in https://github.com/tsingqguo/exposure-fusion-shadow-removal

  44. arXiv:2103.00218  [pdf, other

    cs.CV

    Countering Malicious DeepFakes: Survey, Battleground, and Horizon

    Authors: Felix Juefei-Xu, Run Wang, Yihao Huang, Qing Guo, Lei Ma, Yang Liu

    Abstract: The creation or manipulation of facial appearance through deep generative approaches, known as DeepFake, have achieved significant progress and promoted a wide range of benign and malicious applications, e.g., visual effect assistance in movie and misinformation generation by faking famous persons. The evil side of this new technique poses another popular study, i.e., DeepFake detection aiming to… ▽ More

    Submitted 22 March, 2022; v1 submitted 27 February, 2021; originally announced March 2021.

    Comments: 49 pages. To appear in the International Journal of Computer Vision (IJCV), 2022

  45. arXiv:2011.09884  [pdf, other

    cs.LG cs.AI cs.CV cs.SE

    DeepRepair: Style-Guided Repairing for DNNs in the Real-world Operational Environment

    Authors: Bing Yu, Hua Qi, Qing Guo, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Jianjun Zhao

    Abstract: Deep neural networks (DNNs) are being widely applied for various real-world applications across domains due to their high performance (e.g., high accuracy on image classification). Nevertheless, a well-trained DNN after deployment could oftentimes raise errors during practical use in the operational environment due to the mismatching between distributions of the training dataset and the potential… ▽ More

    Submitted 19 November, 2020; originally announced November 2020.

    Comments: 14 pages; 5 figures

  46. arXiv:2009.09869  [pdf, other

    cs.CR

    FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking

    Authors: Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, Lina Wang

    Abstract: In recent years, DeepFake is becoming a common threat to our society, due to the remarkable progress of generative adversarial networks (GAN) in image synthesis. Unfortunately, existing studies that propose various approaches, in fighting against DeepFake and determining if the facial image is real or fake, is still at an early stage. Obviously, the current DeepFake detection method struggles to c… ▽ More

    Submitted 26 September, 2021; v1 submitted 21 September, 2020; originally announced September 2020.

    Comments: Accepted to ACM Multimedia 2021

  47. arXiv:2009.09258  [pdf, other

    cs.CV

    Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object Detection

    Authors: Ruijun Gao, Qing Guo, Felix Juefei-Xu, Hongkai Yu, Huazhu Fu, Wei Feng, Yang Liu, Song Wang

    Abstract: Co-salient object detection (CoSOD) has recently achieved significant progress and played a key role in retrieval-related tasks. However, it inevitably poses an entirely new safety and security issue, i.e., highly personal and sensitive content can potentially be extracting by powerful CoSOD methods. In this paper, we address this problem from the perspective of adversarial attacks and identify a… ▽ More

    Submitted 17 April, 2022; v1 submitted 19 September, 2020; originally announced September 2020.

    Comments: Accepted to CVPR 2022

  48. arXiv:2009.09247  [pdf, other

    eess.IV cs.CV cs.LG

    Bias Field Poses a Threat to DNN-based X-Ray Recognition

    Authors: Binyu Tian, Qing Guo, Felix Juefei-Xu, Wen Le Chan, Yupeng Cheng, Xiaohong Li, Xiaofei Xie, Shengchao Qin

    Abstract: The chest X-ray plays a key role in screening and diagnosis of many lung diseases including the COVID-19. More recently, many works construct deep neural networks (DNNs) for chest X-ray images to realize automated and efficient diagnosis of lung diseases. However, bias field caused by the improper medical image acquisition process widely exists in the chest X-ray images while the robustness of DNN… ▽ More

    Submitted 3 May, 2021; v1 submitted 19 September, 2020; originally announced September 2020.

    Comments: 6 pages, 5 figures; This work has been accepted to ICME 2021 as the oral presentation

  49. arXiv:2009.09238  [pdf, other

    cs.CV

    EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining

    Authors: Qing Guo, **gyang Sun, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Wei Feng, Yang Liu

    Abstract: Single-image deraining is rather challenging due to the unknown rain model. Existing methods often make specific assumptions of the rain model, which can hardly cover many diverse circumstances in the real world, making them have to employ complex optimization or progressive refinement. This, however, significantly affects these methods' efficiency and effectiveness for many efficiency-critical ap… ▽ More

    Submitted 19 September, 2020; originally announced September 2020.

    Comments: 9 pages, 9 figures

  50. arXiv:2009.09231  [pdf, other

    cs.CV

    Adversarial Exposure Attack on Diabetic Retinopathy Imagery

    Authors: Yupeng Cheng, Felix Juefei-Xu, Qing Guo, Huazhu Fu, Xiaofei Xie, Shang-Wei Lin, Weisi Lin, Yang Liu

    Abstract: Diabetic retinopathy (DR) is a leading cause of vision loss in the world and numerous cutting-edge works have built powerful deep neural networks (DNNs) to automatically classify the DR cases via the retinal fundus images (RFIs). However, RFIs are usually affected by the widely existing camera exposure while the robustness of DNNs to the exposure is rarely explored. In this paper, we study this pr… ▽ More

    Submitted 19 September, 2020; originally announced September 2020.