Obserwuj
Chaowei Xiao
Chaowei Xiao
University of Wisconsin - Madison
Zweryfikowany adres z umich.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Robust physical-world attacks on deep learning visual classification
K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, C Xiao, A Prakash, ...
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017
2877*2017
Generating Adversarial Examples with Adversarial Networks
C Xiao, B Li, JY Zhu, W He, M Liu, D Song
International Joint Conferences on Artificial Intelligence Organization …, 2018
9172018
Tagoram: Real-time tracking of mobile RFID tags to high precision using COTS devices
L Yang, Y Chen, XY Li, C Xiao, M Li, Y Liu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
8102014
Spatially Transformed Adversarial Examples
C Xiao, JY Zhu, B Li, W He, M Liu, D Song
International Conference on Learning Representations, 2018
5652018
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
5002019
Towards stable and efficient training of verifiably robust neural networks
H Zhang, H Chen, C Xiao, S Gowal, R Stanforth, B Li, D Boning, CJ Hsieh
ICLR, 2020
3332020
Voyager: An open-ended embodied agent with large language models
G Wang, Y Xie, Y Jiang, A Mandlekar, C Xiao, Y Zhu, L Fan, ...
arXiv preprint arXiv:2305.16291, 2023
3232023
Robust deep reinforcement learning against adversarial perturbations on state observations
H Zhang, H Chen, C Xiao, B Li, M Liu, D Boning, CJ Hsieh
Advances in Neural Information Processing Systems 33, 21024-21037, 2020
2512020
Diffusion models for adversarial purification
W Nie, B Guo, Y Huang, C Xiao, A Vahdat, A Anandkumar
International Conference on Machine Learning, 2022
2282022
Invisible for both camera and lidar: Security of multi-sensor fusion based perception in autonomous driving under physical-world attacks
Y Cao, N Wang, C Xiao, D Yang, J Fang, R Yang, QA Chen, M Liu, B Li
2021 IEEE symposium on security and privacy (SP), 176-194, 2021
1602021
Semanticadv: Generating adversarial examples via attribute-conditioned image editing
H Qiu, C Xiao, L Yang, X Yan, H Lee, B Li
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
1572020
Adversarial objects against lidar-based autonomous driving systems
Y Cao, C Xiao, D Yang, J Fang, R Yang, M Liu, B Li
arXiv preprint arXiv:1907.05418, 2019
1562019
Automatic radio map adaptation for indoor localization using smartphones
C Wu, Z Yang, C Xiao
IEEE Transactions on Mobile Computing 17 (3), 517-528, 2017
1552017
Test-time prompt tuning for zero-shot generalization in vision-language models
M Shu, W Nie, DA Huang, Z Yu, T Goldstein, A Anandkumar, C Xiao
NeurIPS, 2022
1312022
Meshadv: Adversarial meshes for visual recognition
C Xiao, D Yang, B Li, J Deng, M Liu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
129*2019
Understanding the robustness in vision transformers
D Zhou, Z Yu, E Xie, C Xiao, A Anandkumar, J Feng, JM Alvarez
International Conference on Machine Learning, 27378-27394, 2022
1262022
Characterizing adversarial examples based on spatial consistency information for semantic segmentation
C Xiao, R Deng, B Li, F Yu, M Liu, D Song
Proceedings of the European Conference on Computer Vision (ECCV), 217-234, 2018
1102018
Long-short transformer: Efficient transformers for language and vision
C Zhu, W Ping, C Xiao, M Shoeybi, T Goldstein, A Anandkumar, ...
Advances in neural information processing systems 34, 17723-17736, 2021
1022021
Augmax: Adversarial composition of random augmentations for robust training
H Wang, C Xiao, J Kossaifi, Z Yu, A Anandkumar, Z Wang
Advances in neural information processing systems 34, 237-250, 2021
902021
Improving robustness of {ML} classifiers against realizable evasion attacks using conserved features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th USENIX Security Symposium (USENIX Security 19), 285-302, 2019
852019
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20