You See What I Want You To See: Exploring Targeted Black-Box Transferability Attack for Hash-Based Image Retrieval Systems Y Xiao, C Wang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 31 | 2021 |
A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices C Wang, Y Xiao, X Gao, L Li, J Wang IEEE Transactions on Mobile Computing, 2021 | 27 | 2021 |
Why batch normalization works? a buckling perspective L Chen, H Fei, Y Xiao, J He, H Li 2017 IEEE International Conference on Information and Automation (ICIA …, 2017 | 19 | 2017 |
Evade Deep Image Retrieval by Stashing Private Images in the Hash Space Y Xiao, C Wang, X Gao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 18 | 2020 |
Close the Gap between Deep Learning and Mobile Intelligence by Incorporating Training in the Loop C Wang, Y Xiao, X Gao, L Li, J Wang Proceedings of the 27th ACM International Conference on Multimedia, 1419-1427, 2019 | 10 | 2019 |
Drivers’ Understanding of Artificial Intelligence in Automated Driving Systems: A Study of a Malicious Stop Sign KR Garcia, S Mishler, Y Xiao, C Wang, B Hu, JD Still, J Chen Journal of Cognitive Engineering and Decision Making 16 (4), 237-251, 2022 | 8 | 2022 |
Unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval Y Xiao, C Wang, X Gao International Conference on Security and Privacy in Communication Systems …, 2023 | | 2023 |
Identifying Perturbed Roadway Signs: Perception of AI Capabilities K Garcia, Y Xiao, S Mishler, C Wang, B Hu, J Chen Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66 (1 …, 2022 | | 2022 |
Towards Privacy and Security Concerns of Adversarial Examples in Deep Hashing Image Retrieval Y Xiao Old Dominion University, 2022 | | 2022 |
Human Perception of AI Capabilities in Identifying Malicious Roadway Signs KR Garcia, Y Xiao, S Mishler, C Wang, B Hu, J Chen | | 2021 |
Supplementary Material: You See What I Want You to See: Exploring Targeted Black-Box Transferability Attack for Hash-based Image Retrieval Systems Y Xiao, C Wang | | |