Picture for Xiaoyi Feng

Xiaoyi Feng

Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

Add code
Jun 14, 2024
Viaarxiv icon

Kinship Verification from rPPG using 1DCNN Attention networks

Add code
Sep 14, 2023
Viaarxiv icon

Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

Add code
Sep 13, 2023
Viaarxiv icon

Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference

Add code
Aug 31, 2021
Figure 1 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 2 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 3 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 4 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Viaarxiv icon

Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction

Add code
May 18, 2021
Figure 1 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 2 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 3 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Figure 4 for Non-contact Pain Recognition from Video Sequences with Remote Physiological Measurements Prediction
Viaarxiv icon

Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?

Add code
Jul 07, 2020
Figure 1 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 2 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 3 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Figure 4 for Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Viaarxiv icon

Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition

Add code
Jun 17, 2020
Figure 1 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 2 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 3 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 4 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Viaarxiv icon

Deep Neural Rejection against Adversarial Examples

Add code
Oct 01, 2019
Figure 1 for Deep Neural Rejection against Adversarial Examples
Figure 2 for Deep Neural Rejection against Adversarial Examples
Figure 3 for Deep Neural Rejection against Adversarial Examples
Figure 4 for Deep Neural Rejection against Adversarial Examples
Viaarxiv icon

Audio-Visual Kinship Verification

Add code
Jun 24, 2019
Figure 1 for Audio-Visual Kinship Verification
Figure 2 for Audio-Visual Kinship Verification
Figure 3 for Audio-Visual Kinship Verification
Figure 4 for Audio-Visual Kinship Verification
Viaarxiv icon

3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis

Add code
Mar 27, 2019
Figure 1 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 2 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 3 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 4 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Viaarxiv icon