[go: up one dir, main page]

Follow
Yuefeng Chen
Yuefeng Chen
Alibaba Group
Verified email at alibaba-inc.com
Title
Cited by
Cited by
Year
Spatial-phase shallow learning: rethinking face forgery detection in frequency domain
H Liu, X Li, W Zhou, Y Chen, Y He, H Xue, W Zhang, N Yu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
6972021
Towards robust vision transformer
X Mao, G Qi, Y Chen, X Li, R Duan, S Ye, Y He, H Xue
Proceedings of the IEEE/CVF conference on Computer Vision and Pattern …, 2022
3202022
Sharp multiple instance learning for deepfake video detection
X Li, Y Lang, Y Chen, X Mao, Y He, S Wang, H Xue, Q Lu
Proceedings of the 28th ACM international conference on multimedia, 1864-1872, 2020
2392020
Adversarial laser beam: Effective physical-world attack to dnns in a blink
R Duan, X Mao, AK Qin, Y Chen, S Ye, Y He, Y Yang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
2122021
Self-supervised learning for few-shot image classification
D Chen, Y Chen, Y Li, F Mao, Y He, H Xue
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
1962021
Advdrop: Adversarial attack to dnns by dropping information
R Duan, Y Chen, D Niu, Y Yang, AK Qin, Y He
Proceedings of the IEEE/CVF international conference on computer vision …, 2021
1622021
Towards face encryption by generating adversarial identity masks
X Yang, Y Dong, T Pang, H Su, J Zhu, Y Chen, H Xue
Proceedings of the IEEE/CVF international conference on computer vision …, 2021
1582021
A comprehensive study on robustness of image classification models: Benchmarking and rethinking
C Liu, Y Dong, W Xiang, X Yang, H Su, J Zhu, Y Chen, Y He, H Xue, ...
International Journal of Computer Vision 133 (2), 567-589, 2025
1522025
Beyond imagenet attack: Towards crafting adversarial examples for black-box domains
Q Zhang, X Li, Y Chen, J Song, L Gao, Y He, H Xue
arXiv preprint arXiv:2201.11528, 2022
952022
Toward understanding and boosting adversarial transferability from a distribution perspective
Y Zhu, Y Chen, X Li, K Chen, Y He, X Tian, B Zheng, Y Chen, Q Huang
IEEE Transactions on Image Processing 31, 6487-6501, 2022
842022
Boosting out-of-distribution detection with typical features
Y Zhu, YF Chen, C Xie, X Li, R Zhang, H Xue, X Tian, Y Chen
Advances in Neural Information Processing Systems 35, 20758-20769, 2022
782022
Composite adversarial attacks
X Mao, Y Chen, S Wang, H Su, Y He, H Xue
Proceedings of the AAAI conference on artificial intelligence 35 (10), 8884-8892, 2021
732021
Qair: Practical query-efficient black-box attacks for image retrieval
X Li, J Li, Y Chen, S Ye, Y He, S Wang, H Su, H Xue
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
722021
Enhance the visual representation via discrete adversarial training
X Mao, Y Chen, R Duan, Y Zhu, G Qi, X Li, R Zhang, H Xue
Advances in Neural Information Processing Systems 35, 7520-7533, 2022
522022
S-eval: Automatic and adaptive test generation for benchmarking safety evaluation of large language models
X Yuan, J Li, D Wang, Y Chen, X Mao, L Huang, H Xue, W Wang, K Ren, ...
arXiv e-prints, arXiv: 2405.14191, 2024
502024
Adaptive face forgery detection in cross domain
L Song, Z Fang, X Li, X Dong, Z Jin, Y Chen, S Lyu
European Conference on Computer Vision, 467-484, 2022
482022
D^ 2ETR: decoder-only DETR with computationally efficient cross-scale attention
J Lin, X Mao, Y Chen, L Xu, Y He, H Xue
arXiv preprint arXiv:2203.00860, 2022
472022
Context-aware robust fine-tuning
X Mao, Y Chen, X Jia, R Zhang, H Xue, Z Li
International Journal of Computer Vision 132 (5), 1685-1700, 2024
422024
Coco-o: A benchmark for object detectors under natural distribution shifts
X Mao, Y Chen, Y Zhu, D Chen, H Su, R Zhang, H Xue
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
412023
Imagenet-e: Benchmarking neural network robustness via attribute editing
X Li, Y Chen, Y Zhu, S Wang, R Zhang, H Xue
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
402023
The system can't perform the operation now. Try again later.
Articles 1–20