Zhipeng Wei

Orcid: 0000-0002-0526-4326

According to our database1, Zhipeng Wei authored at least 22 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adaptive Cross-Modal Transferable Adversarial Attacks From Images to Videos.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2024

2023
Knowledge driven weights estimation for large-scale few-shot image recognition.
Pattern Recognit., October, 2023

Towards Transferable Adversarial Attacks on Image and Video Transformers.
IEEE Trans. Image Process., 2023

GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Downstream Task-agnostic Transferable Attacks on Language-Image Pre-training Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Enhancing the Self-Universality for Transferable Targeted Attacks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Trusted Fine-grained Medical Image Classification through Multiple Evidence Fusion.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Incorporating Locality of Images to Generate Targeted Transferable Adversarial Examples.
CoRR, 2022

Adaptive Temporal Grouping for Black-box Adversarial Attacks on Videos.
Proceedings of the ICMR '22: International Conference on Multimedia Retrieval, Newark, NJ, USA, June 27, 2022

High-speed 850 nm Vertical-cavity Surface-emitting Lasers with Multilayer Oxide Aperture.
Proceedings of the 14th IEEE International Conference on Advanced Infocomm Technology, 2022

Cross-Modal Transferable Adversarial Attacks from Images to Videos.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Boosting the Transferability of Video Adversarial Examples via Temporal Translation.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Towards Transferable Adversarial Attacks on Vision Transformers.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Attacking Video Recognition Models with Bullet-Screen Comments.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2020
FeSTwo, a two-step feature selection algorithm based on feature engineering and sampling for the chronological age regression problem.
Comput. Biol. Medicine, 2020

Heuristic Black-Box Adversarial Attacks on Video Recognition Models.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Zero-Shot Ingredient Recognition by Multi-Relational Graph Convolutional Network.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
DietLens-Eout: Large Scale Restaurant Food Photo Recognition.
Proceedings of the 2019 on International Conference on Multimedia Retrieval, 2019

2015
Cracking Intel Sandy Bridge's Cache Hash Function.
CoRR, 2015

2014
CMD: classification-based memory deduplication through page access characteristics.
Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2014

2013
A Tale of Two Counties: How Two School Libraries in Rural Western China Serve Local Needs.
Libr. Trends, 2013

2009
Guiding Enterprise Informatization with System Theory.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009


  Loading...