Picture for Zhaoqiang Xia

Zhaoqiang Xia

Over-parameterization and Adversarial Robustness in Neural Networks: An Overview and Empirical Analysis

Add code
Jun 14, 2024
Viaarxiv icon

HandS3C: 3D Hand Mesh Reconstruction with State Space Spatial Channel Attention from RGB images

Add code
May 14, 2024
Viaarxiv icon

Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks

Add code
Sep 13, 2023
Viaarxiv icon

Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference

Add code
Aug 31, 2021
Figure 1 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 2 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 3 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Figure 4 for Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference
Viaarxiv icon

Revisiting Pixel-Wise Supervision for Face Anti-Spoofing

Add code
Nov 24, 2020
Figure 1 for Revisiting Pixel-Wise Supervision for Face Anti-Spoofing
Figure 2 for Revisiting Pixel-Wise Supervision for Face Anti-Spoofing
Figure 3 for Revisiting Pixel-Wise Supervision for Face Anti-Spoofing
Figure 4 for Revisiting Pixel-Wise Supervision for Face Anti-Spoofing
Viaarxiv icon

Mix Dimension in Poincaré Geometry for 3D Skeleton-based Action Recognition

Add code
Aug 03, 2020
Figure 1 for Mix Dimension in Poincaré Geometry for 3D Skeleton-based Action Recognition
Figure 2 for Mix Dimension in Poincaré Geometry for 3D Skeleton-based Action Recognition
Figure 3 for Mix Dimension in Poincaré Geometry for 3D Skeleton-based Action Recognition
Figure 4 for Mix Dimension in Poincaré Geometry for 3D Skeleton-based Action Recognition
Viaarxiv icon

Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition

Add code
Jun 17, 2020
Figure 1 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 2 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 3 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Figure 4 for Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition
Viaarxiv icon

3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis

Add code
Mar 27, 2019
Figure 1 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 2 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 3 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Figure 4 for 3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis
Viaarxiv icon

Spatiotemporal Recurrent Convolutional Networks for Recognizing Spontaneous Micro-expressions

Add code
Jan 15, 2019
Figure 1 for Spatiotemporal Recurrent Convolutional Networks for Recognizing Spontaneous Micro-expressions
Figure 2 for Spatiotemporal Recurrent Convolutional Networks for Recognizing Spontaneous Micro-expressions
Figure 3 for Spatiotemporal Recurrent Convolutional Networks for Recognizing Spontaneous Micro-expressions
Figure 4 for Spatiotemporal Recurrent Convolutional Networks for Recognizing Spontaneous Micro-expressions
Viaarxiv icon

Face Presentation Attack Detection in Learned Color-liked Space

Add code
Oct 31, 2018
Figure 1 for Face Presentation Attack Detection in Learned Color-liked Space
Figure 2 for Face Presentation Attack Detection in Learned Color-liked Space
Figure 3 for Face Presentation Attack Detection in Learned Color-liked Space
Figure 4 for Face Presentation Attack Detection in Learned Color-liked Space
Viaarxiv icon