publications
2023
-
CVPRPhysically Realizable Natural-Looking Clothing Textures Evade Person Detectors via 3D ModelingIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023
-
arXiv
-
Appli.
-
ISCCDriving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep LearningIn 2023 IEEE Symposium on Computers and Communications (ISCC), 2023
2022
-
arXivOn the Privacy Effect of Data Enhancement via the Lens of MemorizationarXiv preprint arXiv:2208.08270, 2022
-
CVPROralAdversarial Texture for Fooling Person Detectors in the Physical WorldIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022
-
CVPROralInfrared Invisible Clothing: Hiding from Infrared Detectors at Multiple Angles in Real WorldIn Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022
-
Neuro.Amplification Trojan Network: Attack Deep Neural Networks by Amplifying Their Inherent WeaknessNeurocomputing, 2022
2017
-
ICONIPAn STDP-based Supervised Learning Algorithm for Spiking Neural NetworksIn International Conference on Neural Information Processing (ICONIP), 2017