Yuefeng Chen

Orcid: 0000-0001-9027-3421

According to our database1, Yuefeng Chen authored at least 57 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Batch Normalization Is Blind to the First and Second Derivatives of the Loss.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks.
IEEE Trans. Artif. Intell., October, 2023

MaxMatch: Semi-Supervised Learning With Worst-Case Consistency.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2023

Information-Containing Adversarial Perturbation for Combating Facial Manipulation Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Enhancing Few-shot CLIP with Semantic-Aware Fine-Tuning.
CoRR, 2023

Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
CoRR, 2023

COCO-O: A Benchmark for Object Detectors under Natural Distribution Shifts.
CoRR, 2023

Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training.
CoRR, 2023

A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking.
CoRR, 2023

CCC: Chinese Commercial Contracts Dataset for Documents Layout Understanding.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Model Inversion Attack via Dynamic Memory Learning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Defects of Convolutional Decoder Networks in Frequency Representation.
Proceedings of the International Conference on Machine Learning, 2023

Inequality phenomenon in l<sub>∞</sub>-adversarial training, and its unrealized threats.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

P<sup>2</sup>Auth: Two-Factor Authentication Leveraging PIN and Keystroke-Induced PPG Measurements.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

COCO-O: A Benchmark for Object Detectors under Natural Distribution Shifts.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Transaudio: Towards the Transferable Adversarial Audio Attack Via Learning Contextualized Perturbations.
Proceedings of the IEEE International Conference on Acoustics, 2023

ImageNet-E: Benchmarking Neural Network Robustness via Attribute Editing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective.
IEEE Trans. Image Process., 2022

Rethinking Out-of-Distribution Detection From a Human-Centric Perspective.
CoRR, 2022

Context-Aware Robust Fine-Tuning.
CoRR, 2022

Prompt-based Connective Prediction Method for Fine-grained Implicit Discourse Relation Recognition.
CoRR, 2022

Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective.
CoRR, 2022

D^2ETR: Decoder-Only DETR with Computationally Efficient Cross-Scale Attention.
CoRR, 2022

Boosting Out-of-distribution Detection with Typical Features.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Enhance the Visual Representation via Discrete Adversarial Training.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Face Forgery Detection via Symmetric Transformer.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes.
Proceedings of the IEEE INFOCOM 2022, 2022

Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Prompt-based Connective Prediction Method for Fine-grained Implicit Discourse Relation Recognition.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Adaptive Face Forgery Detection in Cross Domain.
Proceedings of the Computer Vision - ECCV 2022, 2022

Towards Robust Vision Transformer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Element Information Enhancement for Diagram Question Answering with Synthetic Data.
Proceedings of the CCKS 2022 - Evaluation Track, 2022

2021
Unrestricted Adversarial Attacks on ImageNet Competition.
CoRR, 2021

Adversarial Attacks on ML Defense Models Competition.
CoRR, 2021

Towards Face Encryption by Generating Adversarial Identity Masks.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

AdvDrop: Adversarial Attack to DNNs by Dropping Information.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Self-Supervised Learning for Few-Shot Image Classification.
Proceedings of the IEEE International Conference on Acoustics, 2021

Adversarial Examples Detection Beyond Image Space.
Proceedings of the IEEE International Conference on Acoustics, 2021

Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

QAIR: Practical Query-Efficient Black-Box Attacks for Image Retrieval.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Composite Adversarial Attacks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
GAP++: Learning to generate target-conditioned adversarial examples.
CoRR, 2020

Sharp Multiple Instance Learning for DeepFake Video Detection.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Learning to Characterize Adversarial Subspaces.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Self-Supervised Adversarial Training.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Text Captcha Is Dead? A Large Scale Deployment and Empirical Study.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
AdvKnn: Adversarial Attacks On K-Nearest Neighbor Classifiers With Approximate Gradients.
CoRR, 2019

Bilinear Representation for Language-based Image Editing Using Conditional Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Acoustics, 2019

2017
基于消费者行为的点餐推荐算法 (Ordering Recommender Algorithm Based on Consumers' Behavior).
计算机科学, 2017

2016
Formal Modeling Self-Adaptive Intelligent Service Component Based on Extenics.
Int. J. Online Eng., 2016

Developing Mobile Software for Extenics Innovation.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

2013
Agent Based Modelling of the Equipment Battle Damage.
J. Comput., 2013

2012
Robust Visual Tracking Using Dynamic Classifier Selection with Sparse Representation of Label Noise.
Proceedings of the Computer Vision - ACCV 2012, 2012

2010
Document Classification with Multi-layered Immune Principle.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

An unsupervised vegetation classification algorithm based immune.
Proceedings of the Sixth International Conference on Natural Computation, 2010


  Loading...