Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
Backdoor Learning: A Survey
- Yiming Li, Baoyuan Wu, Yong Jiang, Zhifeng Li, Shutao Xia
- Computer ScienceIEEE transactions on neural networks and learning…
- 17 July 2020
TLDR
Targeted Attack for Deep Hashing based Retrieval
- Jiawang Bai, B. Chen, E. Yang
- Computer ScienceECCV
- 15 April 2020
TLDR
Rethinking the Trigger of Backdoor Attack
- Yiming Li, Tongqing Zhai, Baoyuan Wu, Yong Jiang, Zhifeng Li, Shutao Xia
- Computer ScienceArXiv
- 9 April 2020
TLDR
Backdoor Defense via Decoupling the Training Process
- Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren
- Computer ScienceArXiv
- 5 February 2022
TLDR
Rectified Decision Trees: Towards Interpretability, Compression and Empirical Soundness
- Jiawang Bai, Yiming Li, Jiawei Li, Yong Jiang, Shutao Xia
- Computer ScienceArXiv
- 14 March 2019
TLDR
Hidden Backdoor Attack against Semantic Segmentation Models
- Yiming Li, Yanjie Li, Yalei Lv, Baoyuan Wu, Yong Jiang, Shutao Xia
- Computer ScienceArXiv
- 6 March 2021
TLDR
Open-sourced Dataset Protection via Backdoor Watermarking
- Yiming Li, Zi-Mou Zhang, Jiawang Bai, Baoyuan Wu, Yong Jiang, Shutao Xia
- Computer ScienceArXiv
- 12 October 2020
TLDR
Manhattan property of geodesic paths on self-affine carpets
For any Bedford-McMullen self-affine carpet, the geodesic path on the carpet between points $$(x_{1},y_{1})$$(x1,y1) and $$(x_{2},y_{2})$$(x2,y2) has length greater than or equal to…
Adversarial Defense Via Local Flatness Regularization
- Jia Xu, Yiming Li, Yang Bai, Yong Jiang, Shutao Xia
- Computer ScienceIEEE International Conference on Image Processing…
- 27 October 2019
TLDR
Toward Adversarial Robustness via Semi-supervised Robust Training
- Yiming Li, Baoyuan Wu, Shutao Xia
- Computer ScienceArXiv
- 16 March 2020
TLDR
...
...