Xia, Shu-Tao
12622  results:
Search for persons X
?
1

On the Effectiveness of Adversarial Training Against Backdo..:

Gao, Yinghua ; Wu, Dongxian ; Zhang, Jingfeng...
IEEE Transactions on Neural Networks and Learning Systems.  , 2024
 
?
2

RAT: Retrieval-Augmented Transformer for Click-Through Rate..:

, In: Companion Proceedings of the ACM on Web Conference 2024,
Li, Yushen ; Wang, Jinpeng ; Dai, Tao... - p. 867-870 , 2024
 
?
3

Imperceptible and Robust Backdoor Attack in 3D Point Cloud:

Gao, Kuofeng ; Bai, Jiawang ; Wu, Baoyuan..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 1267-1282 , 2024
 
?
4

WFTNet: Exploiting Global and Local Periodicity in Long-Ter..:

, In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Liu, Peiyuan ; Wu, Beiliang ; Li, Naiqi... - p. 5960-5964 , 2024
 
?
5

Node-Level Graph Regression With Deep Gaussian Process Mode..:

Li, Naiqi ; Li, Wenjie ; Gao, Yinghua...
IEEE Transactions on Artificial Intelligence.  5 (2024)  6 - p. 3257-3269 , 2024
 
?
7

CFGN: A Lightweight Context Feature Guided Network for Imag..:

Dai, Tao ; Ya, Mengxi ; Li, Jinmin...
IEEE Transactions on Emerging Topics in Computational Intelligence.  8 (2024)  1 - p. 855-865 , 2024
 
?
8

Delving into Identify-Emphasize Paradigm for Combating Unkn..:

Zhao, Bowen ; Chen, Chen ; Wang, Qian-Wei..
International Journal of Computer Vision.  132 (2024)  6 - p. 2310-2330 , 2024
 
?
9

Hugs Bring Double Benefits: Unsupervised Cross-Modal Hashin..:

Wang, Jinpeng ; Zeng, Ziyun ; Chen, Bin...
International Journal of Computer Vision.  132 (2024)  8 - p. 2765-2797 , 2024
 
?
10

Backdoor Learning: A Survey:

Li, Yiming ; Jiang, Yong ; Li, Zhifeng.
IEEE Transactions on Neural Networks and Learning Systems.  35 (2024)  1 - p. 5-22 , 2024
 
?
11

Portfolio Selection via Graph-Aware Gaussian Processes With..:

Li, Naiqi ; Xia, Zhikang ; Li, Yiming...
IEEE Transactions on Artificial Intelligence.  5 (2024)  2 - p. 505-515 , 2024
 
?
12

Backdoor Attack With Sparse and Invisible Trigger:

Gao, Yinghua ; Li, Yiming ; Gong, Xueluan...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 6364-6376 , 2024
 
?
13

CAGEN: Controllable Anomaly Generator using Diffusion Model:

, In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Jiang, Bolin ; Xie, Yuqiu ; Li, Jiawei... - p. 3110-3114 , 2024
 
?
14

New Constructions of MDS Array Codes and Optimal Locally Re..:

Fang, Weijun ; Lv, Jingjie ; Chen, Bin..
IEEE Transactions on Information Theory.  70 (2024)  3 - p. 1806-1822 , 2024
 
?
15

WaterDiff: Perceptual Image Watermarks Via Diffusion Model:

, In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Tan, Yuqi ; Peng, Yuang ; Fang, Hao.. - p. 3250-3254 , 2024
 
1-15