Dab-detr: Dynamic anchor boxes are better queries for detr S Liu, F Li, H Zhang, X Yang, X Qi, H Su, J Zhu, L Zhang arXiv preprint arXiv:2201.12329, 2022 | 928 | 2022 |
Bag of tricks for adversarial training T Pang, X Yang, Y Dong, H Su, J Zhu arXiv preprint arXiv:2010.00467, 2020 | 357* | 2020 |
Benchmarking adversarial robustness on image classification Y Dong, QA Fu, X Yang, T Pang, H Su, Z Xiao, J Zhu proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020 | 341 | 2020 |
Face anti-spoofing: Model matters, so does data X Yang, W Luo, L Bao, Y Gao, D Gong, S Zheng, Z Li, W Liu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 294 | 2019 |
Query2label: A simple transformer way to multi-label classification S Liu, L Zhang, X Yang, H Su, J Zhu arXiv preprint arXiv:2107.10834, 2021 | 251 | 2021 |
On evaluating adversarial robustness of large vision-language models Y Zhao, T Pang, C Du, X Yang, C Li, NMM Cheung, M Lin Advances in Neural Information Processing Systems 36, 54111-54138, 2023 | 203 | 2023 |
Boosting adversarial training with hypersphere embedding T Pang*, X Yang*, Y Dong, K Xu, J Zhu, H Su Advances in Neural Information Processing Systems 33, 7779-7792, 2020 | 169 | 2020 |
Common diffusion noise schedules and sample steps are flawed S Lin, B Liu, J Li, X Yang Proceedings of the IEEE/CVF winter conference on applications of computer …, 2024 | 165 | 2024 |
Robustness and accuracy could be reconcilable by (proper) definition T Pang, M Lin, X Yang, J Zhu, S Yan International conference on machine learning, 17258-17277, 2022 | 154 | 2022 |
A recipe for watermarking diffusion models Y Zhao, T Pang, C Du, X Yang, NM Cheung, M Lin arXiv preprint arXiv:2303.10137, 2023 | 136 | 2023 |
Black-box detection of backdoor attacks with limited information and data Y Dong, X Yang, Z Deng, T Pang, Z Xiao, H Su, J Zhu Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 133 | 2021 |
How robust is google's bard to adversarial image attacks? Y Dong, H Chen, J Chen, Z Fang, X Yang, Y Zhang, Y Tian, H Su, J Zhu arXiv preprint arXiv:2309.11751, 2023 | 110 | 2023 |
Towards face encryption by generating adversarial identity masks X Yang, Y Dong, T Pang, H Su, J Zhu, Y Chen, H Xue Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 108 | 2021 |
Benchmarking robustness of 3d object detection to common corruptions Y Dong, C Kang, J Zhang, Z Zhu, Y Wang, X Yang, H Su, X Wei, J Zhu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 101 | 2023 |
Exploring memorization in adversarial training Y Dong, K Xu, X Yang, T Pang, Z Deng, H Su, J Zhu arXiv preprint arXiv:2106.01606, 2021 | 92 | 2021 |
Libre: A practical bayesian approach to adversarial detection Z Deng, X Yang, S Xu, H Su, J Zhu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 76 | 2021 |
A comprehensive study on robustness of image classification models: Benchmarking and rethinking C Liu, Y Dong, W Xiang, X Yang, H Su, J Zhu, Y Chen, Y He, H Xue, ... International Journal of Computer Vision, 1-23, 2024 | 75 | 2024 |
Economic, environmental, and emergy analysis of China's green tea production Q Xu, Y Yang, K Hu, J Chen, SN Djomo, X Yang, MT Knudsen Sustainable Production and Consumption 28, 269-280, 2021 | 67 | 2021 |
Robust classification via a single diffusion model H Chen, Y Dong, Z Wang, X Yang, C Duan, H Su, J Zhu arXiv preprint arXiv:2305.15241, 2023 | 60 | 2023 |
Evil geniuses: Delving into the safety of llm-based agents Y Tian, X Yang, J Zhang, Y Dong, H Su arXiv preprint arXiv:2311.11855, 2023 | 52 | 2023 |