Picture for Xiaoyi Feng

Xiaoyi Feng

Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

Add code
Jun 14, 2024
Viaarxiv icon

Kinship Verification from rPPG using 1DCNN Attention networks

Add code
Sep 14, 2023
Viaarxiv icon

Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

Add code
Sep 13, 2023
Figure 1 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 2 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 3 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Figure 4 for Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks
Viaarxiv icon

Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference

Add code
Aug 31, 2021
Figure 1 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 2 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 3 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 4 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Viaarxiv icon

Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction

Add code
May 18, 2021
Figure 1 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 2 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 3 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 4 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Viaarxiv icon

Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?

Add code
Jul 07, 2020
Figure 1 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 2 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 3 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 4 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Viaarxiv icon

Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition

Add code
Jun 17, 2020
Figure 1 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 2 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 3 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 4 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Viaarxiv icon

Deep Neural Rejection against Adversarial Examples

Add code
Oct 01, 2019
Figure 1 for Deep Neural Rejection against Adversarial Examples
Figure 2 for Deep Neural Rejection against Adversarial Examples
Figure 3 for Deep Neural Rejection against Adversarial Examples
Figure 4 for Deep Neural Rejection against Adversarial Examples
Viaarxiv icon

Audio-Visual Kinship Verification

Add code
Jun 24, 2019
Figure 1 for Audio-Visual Kinship Verification
Figure 2 for Audio-Visual Kinship Verification
Figure 3 for Audio-Visual Kinship Verification
Figure 4 for Audio-Visual Kinship Verification
Viaarxiv icon

3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis

Add code
Mar 27, 2019
Figure 1 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 2 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 3 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 4 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Viaarxiv icon