Picture for Yajie Wang

Yajie Wang

Guiding Quantitative MRI Reconstruction with Phase-wise Uncertainty

Add code
Feb 28, 2025
Viaarxiv icon

Static Batching of Irregular Workloads on GPUs: Framework and Application to Efficient MoE Model Inference

Add code
Jan 27, 2025
Figure 1 for Static Batching of Irregular Workloads on GPUs: Framework and Application to Efficient MoE Model Inference
Viaarxiv icon

Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment based on Anthropic Prior Knowledge

Add code
Apr 01, 2024
Figure 1 for Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment based on Anthropic Prior Knowledge
Figure 2 for Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment based on Anthropic Prior Knowledge
Figure 3 for Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment based on Anthropic Prior Knowledge
Figure 4 for Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment based on Anthropic Prior Knowledge
Viaarxiv icon

Towards Transferable Adversarial Attacks with Centralized Perturbation

Add code
Dec 23, 2023
Figure 1 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 2 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 3 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 4 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Viaarxiv icon

Unified High-binding Watermark for Unconditional Image Generation Models

Add code
Oct 14, 2023
Figure 1 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 2 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 3 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 4 for Unified High-binding Watermark for Unconditional Image Generation Models
Viaarxiv icon

Artificial Intelligence Security Competition (AISC)

Add code
Dec 07, 2022
Figure 1 for Artificial Intelligence Security Competition (AISC)
Figure 2 for Artificial Intelligence Security Competition (AISC)
Figure 3 for Artificial Intelligence Security Competition (AISC)
Figure 4 for Artificial Intelligence Security Competition (AISC)
Viaarxiv icon

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers

Add code
Jun 10, 2022
Figure 1 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 2 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 3 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 4 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Viaarxiv icon

l-Leaks: Membership Inference Attacks with Logits

Add code
May 13, 2022
Figure 1 for l-Leaks: Membership Inference Attacks with Logits
Figure 2 for l-Leaks: Membership Inference Attacks with Logits
Figure 3 for l-Leaks: Membership Inference Attacks with Logits
Figure 4 for l-Leaks: Membership Inference Attacks with Logits
Viaarxiv icon

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches

Add code
Apr 27, 2022
Figure 1 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 2 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 3 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 4 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Viaarxiv icon

Boosting Adversarial Transferability of MLP-Mixer

Add code
Apr 26, 2022
Figure 1 for Boosting Adversarial Transferability of MLP-Mixer
Figure 2 for Boosting Adversarial Transferability of MLP-Mixer
Figure 3 for Boosting Adversarial Transferability of MLP-Mixer
Figure 4 for Boosting Adversarial Transferability of MLP-Mixer
Viaarxiv icon