Picture for Yingyuan Yang

Yingyuan Yang

Trunk-branch Contrastive Network with Multi-view Deformable Aggregation for Multi-view Action Recognition

Add code
Feb 23, 2025
Viaarxiv icon

Subpixel Edge Localization Based on Converted Intensity Summation under Stable Edge Region

Add code
Feb 23, 2025
Viaarxiv icon

Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids

Add code
Feb 17, 2021
Figure 1 for Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Figure 2 for Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Figure 3 for Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Figure 4 for Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids
Viaarxiv icon

Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks

Add code
Oct 16, 2020
Figure 1 for Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Figure 2 for Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Figure 3 for Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Figure 4 for Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks
Viaarxiv icon

SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection

Add code
Jun 02, 2020
Figure 1 for SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Figure 2 for SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Figure 3 for SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Figure 4 for SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Viaarxiv icon

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems

Add code
Mar 12, 2020
Figure 1 for ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Figure 2 for ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Figure 3 for ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Figure 4 for ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Viaarxiv icon