Siyuan Liang

Orcid: 0000-0001-6793-5810

According to our database1, Siyuan Liang authored at least 77 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Chinese nested entity recognition method for the finance domain based on heterogeneous graph network.
Inf. Process. Manag., 2024

Patch is Enough: Naturalistic Adversarial Patch against Vision-Language Pre-training Models.
CoRR, 2024

Efficient Backdoor Defense in Multimodal Contrastive Learning: A Token-Level Unlearning Method for Mitigating Threats.
CoRR, 2024

Towards Robust Object Detection: Identifying and Removing Backdoors via Module Inconsistency Analysis.
CoRR, 2024

Adversarial Backdoor Defense in CLIP.
CoRR, 2024

Module-wise Adaptive Adversarial Training for End-to-end Autonomous Driving.
CoRR, 2024

Compromising Embodied Agents with Contextual Backdoor Attacks.
CoRR, 2024

GenderBias-VL: Benchmarking Gender Bias in Vision Language Models via Counterfactual Probing.
CoRR, 2024

Revisiting Backdoor Attacks against Large Vision-Language Models.
CoRR, 2024

Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt.
CoRR, 2024

LanEvil: Benchmarking the Robustness of Lane Detection to Environmental Illusions.
CoRR, 2024

Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack.
CoRR, 2024

Environmental Matching Attack Against Unmanned Aerial Vehicles Object Detection.
CoRR, 2024

Object Detectors in the Open Environment: Challenges, Solutions, and Outlook.
CoRR, 2024

Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning.
CoRR, 2024

Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs.
CoRR, 2024

VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models.
CoRR, 2024

Mid-Infrared Hollow-Core Waveguide Gas Sensor for Low-Concentration Sulfur Hexafluor Detection.
IEEE Access, 2024

CNN-Based Digital Twin Model for Ultra-High Voltage Direct Current System Loss Measurement.
IEEE Access, 2024

Random Error Elimination Algorithm of Microelectromechanical Gyroscope Array.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

Towards Robust Physical-world Backdoor Attacks on Lane Detection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

<i>LanEvil</i>: Benchmarking the Robustness of Lane Detection to Environmental Illusions.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Less is More: Fewer Interpretable Region via Submodular Subset Selection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

LaMUX: Optimized Logic-Gate-Enabled High-Performance Microfluidic Multiplexer Design.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

Late Breaking Results: Efficient Built-in Self-Test for Microfluidic Large-Scale Integration (mLSI).
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Does Few-Shot Learning Suffer from Backdoor Attacks?
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Learning to Optimize Permutation Flow Shop Scheduling via Graph-Based Imitation Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Correlation Matching Transformation Transformers for UHD Image Restoration.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Deep learning-based lightweight radar target detection method.
J. Real Time Image Process., August, 2023

Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps.
IEEE Trans. Inf. Forensics Secur., 2023

A classification algorithm based on improved meta learning and transfer learning for few-shot medical images.
IET Image Process., 2023

Pre-trained Trojan Attacks for Visual Recognition.
CoRR, 2023

SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation.
CoRR, 2023

Improving Adversarial Transferability by Stable Diffusion.
CoRR, 2023

Optimal Inter-area Oscillation Damping Control: A Transfer Deep Reinforcement Learning Approach with Switching Control Strategy.
CoRR, 2023

Real-Time Monitoring Method for Thyristor Losses in Ultra High Voltage Converter Station Based on Wavelet Optimized GA-BP Neural Network.
IEEE Access, 2023

Semantic map construction based on LIDAR and vision fusion.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Exploring Inconsistent Knowledge Distillation for Object Detection with Data Augmentation.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Face Encryption via Frequency-Restricted Identity-Agnostic Attacks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

ARMM: Adaptive Reliability Quantification Model of Microfluidic Designs and its Graph-Transformer-Based Implementation.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

The Progressive Detectors and Discriminative Feature Descriptors Combining Global and Local Information.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

Exploring the Relationship Between Architectural Design and Adversarially Robust Generalization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Diversifying the High-level Features for better Adversarial Transferability.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

Improving Robust Fariness via Balance Adversarial Training.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Edge YOLO: Real-Time Intelligent Object Detection System Based on Edge-Cloud Cooperation in Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Learning to Optimize Permutation Flow Shop Scheduling via Graph-based Imitation Learning.
CoRR, 2022

Exploring the Relationship between Architecture and Adversarially Robust Generalization.
CoRR, 2022

Rethinking Data Augmentation in Knowledge Distillation for Object Detection.
CoRR, 2022

Improving Robust Fairness via Balance Adversarial Training.
CoRR, 2022

Adaptive Perturbation Generation for Multiple Backdoors Detection.
CoRR, 2022

Edge YOLO: Real-Time Intelligent Object Detection System Based on Edge-Cloud Cooperation in Autonomous Vehicles.
CoRR, 2022

Fast Transient Stability Prediction Using Grid-informed Temporal and Topological Embedding Deep Neural Network.
CoRR, 2022

Imitated Detectors: Stealing Knowledge of Black-box Object Detectors.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

CoMUX: Combinatorial-Coding-Based High-Performance Microfluidic Control Multiplexer Design.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON System in Industrial Internet Based on Compressed Sensing.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

SimpleDG: Simple Domain Generalization Baseline Without Bells and Whistles.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection.
Proceedings of the Computer Vision - ECCV 2022, 2022

Channel Estimation Algorithm of OFDM-RoF System in 5G Mobile Front-end Network Based on Artificial Neural Network.
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022

2021
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Energy Balanced Clustering Routing Protocol for Wireless Sensor Networks.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

Realization of comprehensive monitoring and friendly evaluation system for gas environment of rail transit station.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

LMS Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON Systems in 5G-Enabled Industrial Internet.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
High-Efficiency Wavelet Compressive Fusion for Improving MEMS Array Performance.
Sensors, 2020

Efficient Adversarial Attacks for Visual Object Tracking.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Transferable Adversarial Attacks for Image and Video Object Detection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
Transferable Adversarial Attacks for Image and Video Object Detection.
CoRR, 2018

Reinforcement Learning based Anti-jamming Frequency Hopping Strategies Design for Cognitive Radar.
Proceedings of the 2018 IEEE International Conference on Signal Processing, 2018

Differentially Variable Genes of Oral Squamous Cell Carcinoma.
Proceedings of the 3rd International Conference on Crowd Science and Engineering, 2018

2017
Alcohol-Induced Differential Variable Genes.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017


  Loading...