Shu-Tao Xia
Cited by
Cited by
Second-order attention network for single image super-resolution
T Dai, J Cai, Y Zhang, ST Xia, L Zhang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
Adversarial weight perturbation helps robust generalization
D Wu, ST Xia, Y Wang
Advances in neural information processing systems 33, 2958-2969, 2020
Backdoor learning: A survey
Y Li, Y Jiang, Z Li, ST Xia
IEEE Transactions on Neural Networks and Learning Systems, 2022
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, S Erfani, S Xia, S Wijewickrema, ...
International Conference on Machine Learning, 3355-3364, 2018
Maintaining discrimination and fairness in class incremental learning
B Zhao, X Xiao, G Gan, B Zhang, ST Xia
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE conference on computer vision and pattern …, 2018
Tokenpose: Learning keypoint tokens for human pose estimation
Y Li, S Zhang, Z Wang, S Yang, W Yang, ST Xia, E Zhou
Proceedings of the IEEE/CVF International conference on computer vision …, 2021
Rethinking the trigger of backdoor attack
Y Li, T Zhai, B Wu, Y Jiang, Z Li, S Xia
arXiv preprint arXiv:2004.04692, 2020
Johnson type bounds on constant dimension codes
ST Xia, FW Fu
Designs, Codes and Cryptography 50, 163-172, 2009
Improving adversarial robustness via channel-wise activation suppressing
Y Bai, Y Zeng, Y Jiang, ST Xia, X Ma, Y Wang
arXiv preprint arXiv:2103.08307, 2021
Backdoor attack against speaker verification
T Zhai, Y Li, Z Zhang, B Wu, Y Jiang, ST Xia
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
Byte segment neural network for network traffic classification
R Li, X Xiao, S Ni, H Zheng, S Xia
2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 1-10, 2018
A novel consistent random forest framework: Bernoulli random forests
Y Wang, ST Xia, Q Tang, J Wu, X Zhu
IEEE transactions on neural networks and learning systems 29 (8), 3510-3523, 2017
CNN–MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites
X Xiao, D Zhang, G Hu, Y Jiang, S Xia
Neural Networks 125, 303-312, 2020
Constructions of Optimal Cyclic Locally Repairable Codes
B Chen, ST Xia, J Hao, FW Fu
IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017
Targeted attack for deep hashing based retrieval
J Bai, B Chen, Y Li, D Wu, W Guo, S Xia, E Yang
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
Backdoor attack in the physical world
Y Li, T Zhai, Y Jiang, Z Li, ST Xia
arXiv preprint arXiv:2104.02361, 2021
Back‐propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
X Xiao, Z Wang, Q Li, S Xia, Y Jiang
IET Information Security 11 (1), 8-15, 2017
One-shot adversarial attacks on visual tracking with dual attention
X Chen, X Yan, F Zheng, Y Jiang, ST Xia, Y Zhao, R Ji
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20