Search Results - "Tao, Shu"
-
1
Backdoor Learning: A Survey
Published in IEEE transaction on neural networks and learning systems (01-01-2024)“…Backdoor attack intends to embed hidden backdoors into deep neural networks (DNNs), so that the attacked models perform well on benign samples, whereas their…”
Get full text
Journal Article -
2
Second-Order Attention Network for Single Image Super-Resolution
Published in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (01-06-2019)“…Recently, deep convolutional neural networks (CNNs) have been widely explored in single image super-resolution (SISR) and obtained remarkable performance…”
Get full text
Conference Proceeding -
3
The Challenges and Solutions for Cadmium-contaminated Rice in China: A Critical Review
Published in Environment international (01-07-2016)“…The wide occurrence of Cd-contaminated rice in southern China poses significant public health risk and deserves immediate action, which arises primarily from…”
Get full text
Journal Article -
4
Multi-label learning for concept-oriented labels of product image data
Published in Image and vision computing (01-01-2020)“…In the designing field, designers usually retrieve the images for reference according to product attributes when designing new proposals. To obtain the…”
Get full text
Journal Article -
5
Current status and geological conditions for the applicability of CBM drilling technologies in China: A review
Published in International journal of coal geology (01-02-2019)“…Coalbed methane (CBM) drilling technology is critical in achieving efficient CBM development. The geological conditions for CBM development in China are…”
Get full text
Journal Article -
6
A Novel Consistent Random Forest Framework: Bernoulli Random Forests
Published in IEEE transaction on neural networks and learning systems (01-08-2018)“…Random forests (RFs) are recognized as one type of ensemble learning method and are effective for the most classification and regression tasks. Despite their…”
Get full text
Journal Article -
7
Multi-sensor remote sensing image alignment based on fast algorithms
Published in Journal of intelligent systems (12-07-2023)“…Remote sensing image technology to the ground has important guiding significance in disaster assessment and emergency rescue deployment. In order to realize…”
Get full text
Journal Article -
8
Constructions of Optimal Cyclic (,) Locally Repairable Codes
Published in IEEE transactions on information theory (01-04-2018)“…A code is said to be an <inline-formula> <tex-math notation="LaTeX">r </tex-math></inline-formula>-local locally repairable code (LRC) if each of its…”
Get full text
Journal Article -
9
Releases of brominated flame retardants (BFRs) from microplastics in aqueous medium: Kinetics and molecular-size dependence of diffusion
Published in Water research (Oxford) (15-03-2019)“…Microplastics (<5 mm) are increasingly detected in aquatic environment, and the high levels of brominated flame retardants (BFRs) contained in them can…”
Get full text
Journal Article -
10
Public Health Risk of Arsenic Species in Chicken Tissues from Live Poultry Markets of Guangdong Province, China
Published in Environmental science & technology (21-03-2017)“…Arsenic-based feed additives, such as roxarsone (ROX), are still legally and widely used in food animal production in many countries. This study was conducted…”
Get full text
Journal Article -
11
Binary Matrices for Compressed Sensing
Published in IEEE transactions on signal processing (01-01-2018)“…For an m x n binary matrix with d nonzero elements per column, it is interesting to identify the minimal column degree d that corresponds to the best recovery…”
Get full text
Journal Article -
12
Opportunity and challenges in large-scale geothermal energy exploitation in China
Published in Critical reviews in environmental science and technology (02-11-2022)“…Under the significant pressure to diversify energy supply and reduce the dependence on fossil fuels, harnessing the vast geothermal resources has been made a…”
Get full text
Journal Article -
13
Versatile Weight Attack Via Flipping Limited Bits
Published in IEEE transactions on pattern analysis and machine intelligence (01-11-2023)“…Many attack paradigms against deep neural networks have been well studied, such as the backdoor attack in the training stage and the adversarial attack in the…”
Get full text
Journal Article -
14
Multinomial random forest
Published in Pattern recognition (01-02-2022)“…•We propose a novel multinomial-based method to improve the greedy splitting process of decision trees.•We propose a new random forests variant, dubbed…”
Get full text
Journal Article -
15
Biological impact of environmental polycyclic aromatic hydrocarbons (ePAHs) as endocrine disruptors
Published in Environmental pollution (1987) (01-06-2016)“…Polycyclic aromatic hydrocarbons (PAHs) are often detected in the environment and are regarded as endocrine disruptors. We here designated mixtures of PAHs in…”
Get full text
Journal Article -
16
Query efficient black-box adversarial attack on deep neural networks
Published in Pattern recognition (01-01-2023)“…•We explore the flexible versions of NP-Attack, when combined with the surrogate models. Our method could show a better query efficiency, demonstrating that…”
Get full text
Journal Article -
17
Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor Attacks
Published in Pattern recognition (01-07-2023)“…•We reveal that the difficulty of clean-label backdoor attacks is mostly due to the antagonistic effects of ‘robust features’ and verify that DNNs have…”
Get full text
Journal Article -
18
Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach
Published in IEEE transactions on information theory (01-12-2020)“…A locally repairable code (LRC) is a linear code such that every code symbol can be recovered by accessing a small number of other code symbols. In this paper,…”
Get full text
Journal Article -
19
Black-Box Dataset Ownership Verification via Backdoor Watermarking
Published in IEEE transactions on information forensics and security (2023)“…Deep learning, especially deep neural networks (DNNs), has been widely and successfully adopted in many critical applications for its high effectiveness and…”
Get full text
Journal Article -
20
Deep image prior based defense against adversarial examples
Published in Pattern recognition (01-02-2022)“…•A defense method against adversarial examples.•Our method captures the image internal priors of the input itself.•Our method follows a two-stage feature…”
Get full text
Journal Article