Second-order attention network for single image super-resolution T Dai, J Cai, Y Zhang, ST Xia, L Zhang Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 1680 | 2019 |
Adversarial weight perturbation helps robust generalization D Wu, ST Xia, Y Wang Advances in neural information processing systems 33, 2958-2969, 2020 | 670 | 2020 |
Backdoor learning: A survey Y Li, Y Jiang, Z Li, ST Xia IEEE Transactions on Neural Networks and Learning Systems, 2022 | 524 | 2022 |
Dimensionality-driven learning with noisy labels X Ma, Y Wang, ME Houle, S Zhou, S Erfani, S Xia, S Wijewickrema, ... International Conference on Machine Learning, 3355-3364, 2018 | 438 | 2018 |
Maintaining discrimination and fairness in class incremental learning B Zhao, X Xiao, G Gan, B Zhang, ST Xia Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020 | 407 | 2020 |
Skip connections matter: On the transferability of adversarial examples generated with resnets D Wu, Y Wang, ST Xia, J Bailey, X Ma arXiv preprint arXiv:2002.05990, 2020 | 340 | 2020 |
Iterative learning with open-set noisy labels Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia Proceedings of the IEEE conference on computer vision and pattern …, 2018 | 336 | 2018 |
Tokenpose: Learning keypoint tokens for human pose estimation Y Li, S Zhang, Z Wang, S Yang, W Yang, ST Xia, E Zhou Proceedings of the IEEE/CVF International conference on computer vision …, 2021 | 251 | 2021 |
Rethinking the trigger of backdoor attack Y Li, T Zhai, B Wu, Y Jiang, Z Li, S Xia arXiv preprint arXiv:2004.04692, 2020 | 151 | 2020 |
Johnson type bounds on constant dimension codes ST Xia, FW Fu Designs, Codes and Cryptography 50, 163-172, 2009 | 146 | 2009 |
Improving adversarial robustness via channel-wise activation suppressing Y Bai, Y Zeng, Y Jiang, ST Xia, X Ma, Y Wang arXiv preprint arXiv:2103.08307, 2021 | 117 | 2021 |
Backdoor attack against speaker verification T Zhai, Y Li, Z Zhang, B Wu, Y Jiang, ST Xia ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 104 | 2021 |
Byte segment neural network for network traffic classification R Li, X Xiao, S Ni, H Zheng, S Xia 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 1-10, 2018 | 101 | 2018 |
A novel consistent random forest framework: Bernoulli random forests Y Wang, ST Xia, Q Tang, J Wu, X Zhu IEEE transactions on neural networks and learning systems 29 (8), 3510-3523, 2017 | 95 | 2017 |
CNN–MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites X Xiao, D Zhang, G Hu, Y Jiang, S Xia Neural Networks 125, 303-312, 2020 | 94 | 2020 |
Constructions of Optimal Cyclic Locally Repairable Codes B Chen, ST Xia, J Hao, FW Fu IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017 | 93 | 2017 |
Targeted attack for deep hashing based retrieval J Bai, B Chen, Y Li, D Wu, W Guo, S Xia, E Yang Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020 | 86 | 2020 |
Backdoor attack in the physical world Y Li, T Zhai, Y Jiang, Z Li, ST Xia arXiv preprint arXiv:2104.02361, 2021 | 85 | 2021 |
Back‐propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences X Xiao, Z Wang, Q Li, S Xia, Y Jiang IET Information Security 11 (1), 8-15, 2017 | 85 | 2017 |
One-shot adversarial attacks on visual tracking with dual attention X Chen, X Yan, F Zheng, Y Jiang, ST Xia, Y Zhao, R Ji Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020 | 80 | 2020 |