Search Results - "Tao, Shu"

Refine Results
  1. 1

    Backdoor Learning: A Survey by Li, Yiming, Jiang, Yong, Li, Zhifeng, Xia, Shu-Tao

    “…Backdoor attack intends to embed hidden backdoors into deep neural networks (DNNs), so that the attacked models perform well on benign samples, whereas their…”
    Get full text
    Journal Article
  2. 2

    Second-Order Attention Network for Single Image Super-Resolution by Dai, Tao, Cai, Jianrui, Zhang, Yongbing, Xia, Shu-Tao, Zhang, Lei

    “…Recently, deep convolutional neural networks (CNNs) have been widely explored in single image super-resolution (SISR) and obtained remarkable performance…”
    Get full text
    Conference Proceeding
  3. 3

    The Challenges and Solutions for Cadmium-contaminated Rice in China: A Critical Review by Hu, Yuanan, Cheng, Hefa, Tao, Shu

    Published in Environment international (01-07-2016)
    “…The wide occurrence of Cd-contaminated rice in southern China poses significant public health risk and deserves immediate action, which arises primarily from…”
    Get full text
    Journal Article
  4. 4

    Multi-label learning for concept-oriented labels of product image data by Dai, Yong, Li, Yi, Li, Shu-Tao

    Published in Image and vision computing (01-01-2020)
    “…In the designing field, designers usually retrieve the images for reference according to product attributes when designing new proposals. To obtain the…”
    Get full text
    Journal Article
  5. 5

    Current status and geological conditions for the applicability of CBM drilling technologies in China: A review by Tao, Shu, Pan, Zhejun, Tang, Shuling, Chen, Shida

    Published in International journal of coal geology (01-02-2019)
    “…Coalbed methane (CBM) drilling technology is critical in achieving efficient CBM development. The geological conditions for CBM development in China are…”
    Get full text
    Journal Article
  6. 6

    A Novel Consistent Random Forest Framework: Bernoulli Random Forests by Wang, Yisen, Xia, Shu-Tao, Tang, Qingtao, Wu, Jia, Zhu, Xingquan

    “…Random forests (RFs) are recognized as one type of ensemble learning method and are effective for the most classification and regression tasks. Despite their…”
    Get full text
    Journal Article
  7. 7

    Multi-sensor remote sensing image alignment based on fast algorithms by Shu, Tao

    Published in Journal of intelligent systems (12-07-2023)
    “…Remote sensing image technology to the ground has important guiding significance in disaster assessment and emergency rescue deployment. In order to realize…”
    Get full text
    Journal Article
  8. 8

    Constructions of Optimal Cyclic (,) Locally Repairable Codes by Chen, Bin, Xia, Shu-Tao, Hao, Jie, Fu, Fang-Wei

    Published in IEEE transactions on information theory (01-04-2018)
    “…A code is said to be an <inline-formula> <tex-math notation="LaTeX">r </tex-math></inline-formula>-local locally repairable code (LRC) if each of its…”
    Get full text
    Journal Article
  9. 9

    Releases of brominated flame retardants (BFRs) from microplastics in aqueous medium: Kinetics and molecular-size dependence of diffusion by Sun, Bingbing, Hu, Yuanan, Cheng, Hefa, Tao, Shu

    Published in Water research (Oxford) (15-03-2019)
    “…Microplastics (<5 mm) are increasingly detected in aquatic environment, and the high levels of brominated flame retardants (BFRs) contained in them can…”
    Get full text
    Journal Article
  10. 10

    Public Health Risk of Arsenic Species in Chicken Tissues from Live Poultry Markets of Guangdong Province, China by Hu, Yuanan, Zhang, Wenfeng, Cheng, Hefa, Tao, Shu

    Published in Environmental science & technology (21-03-2017)
    “…Arsenic-based feed additives, such as roxarsone (ROX), are still legally and widely used in food animal production in many countries. This study was conducted…”
    Get full text
    Journal Article
  11. 11

    Binary Matrices for Compressed Sensing by Lu, Weizhi, Dai, Tao, Xia, Shu-Tao

    Published in IEEE transactions on signal processing (01-01-2018)
    “…For an m x n binary matrix with d nonzero elements per column, it is interesting to identify the minimal column degree d that corresponds to the best recovery…”
    Get full text
    Journal Article
  12. 12

    Opportunity and challenges in large-scale geothermal energy exploitation in China by Hu, Yuanan, Cheng, Hefa, Tao, Shu

    “…Under the significant pressure to diversify energy supply and reduce the dependence on fossil fuels, harnessing the vast geothermal resources has been made a…”
    Get full text
    Journal Article
  13. 13

    Versatile Weight Attack Via Flipping Limited Bits by Bai, Jiawang, Wu, Baoyuan, Li, Zhifeng, Xia, Shu-Tao

    “…Many attack paradigms against deep neural networks have been well studied, such as the backdoor attack in the training stage and the adversarial attack in the…”
    Get full text
    Journal Article
  14. 14

    Multinomial random forest by Bai, Jiawang, Li, Yiming, Li, Jiawei, Yang, Xue, Jiang, Yong, Xia, Shu-Tao

    Published in Pattern recognition (01-02-2022)
    “…•We propose a novel multinomial-based method to improve the greedy splitting process of decision trees.•We propose a new random forests variant, dubbed…”
    Get full text
    Journal Article
  15. 15

    Biological impact of environmental polycyclic aromatic hydrocarbons (ePAHs) as endocrine disruptors by Zhang, Yanyan, Dong, Sijun, Wang, Hongou, Tao, Shu, Kiyama, Ryoiti

    Published in Environmental pollution (1987) (01-06-2016)
    “…Polycyclic aromatic hydrocarbons (PAHs) are often detected in the environment and are regarded as endocrine disruptors. We here designated mixtures of PAHs in…”
    Get full text
    Journal Article
  16. 16

    Query efficient black-box adversarial attack on deep neural networks by Bai, Yang, Wang, Yisen, Zeng, Yuyuan, Jiang, Yong, Xia, Shu-Tao

    Published in Pattern recognition (01-01-2023)
    “…•We explore the flexible versions of NP-Attack, when combined with the surrogate models. Our method could show a better query efficiency, demonstrating that…”
    Get full text
    Journal Article
  17. 17

    Not All Samples Are Born Equal: Towards Effective Clean-Label Backdoor Attacks by Gao, Yinghua, Li, Yiming, Zhu, Linghui, Wu, Dongxian, Jiang, Yong, Xia, Shu-Tao

    Published in Pattern recognition (01-07-2023)
    “…•We reveal that the difficulty of clean-label backdoor attacks is mostly due to the antagonistic effects of ‘robust features’ and verify that DNNs have…”
    Get full text
    Journal Article
  18. 18

    Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach by Hao, Jie, Xia, Shu-Tao, Shum, Kenneth W., Chen, Bin, Fu, Fang-Wei, Yang, Yixian

    Published in IEEE transactions on information theory (01-12-2020)
    “…A locally repairable code (LRC) is a linear code such that every code symbol can be recovered by accessing a small number of other code symbols. In this paper,…”
    Get full text
    Journal Article
  19. 19

    Black-Box Dataset Ownership Verification via Backdoor Watermarking by Li, Yiming, Zhu, Mingyan, Yang, Xue, Jiang, Yong, Wei, Tao, Xia, Shu-Tao

    “…Deep learning, especially deep neural networks (DNNs), has been widely and successfully adopted in many critical applications for its high effectiveness and…”
    Get full text
    Journal Article
  20. 20

    Deep image prior based defense against adversarial examples by Dai, Tao, Feng, Yan, Chen, Bin, Lu, Jian, Xia, Shu-Tao

    Published in Pattern recognition (01-02-2022)
    “…•A defense method against adversarial examples.•Our method captures the image internal priors of the input itself.•Our method follows a two-stage feature…”
    Get full text
    Journal Article