Follow
yucheng shi
yucheng shi
Tianjin University, College of Intelligence and Computing
Verified email at tju.edu.cn
Title
Cited by
Cited by
Year
Curls & whey: Boosting black-box adversarial attacks
Y Shi, S Wang, Y Han
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
1382019
Explore multi-step reasoning in video question answering
X Song, Y Shi, X Chen, Y Han
Proceedings of the 26th ACM international conference on Multimedia, 239-247, 2018
622018
Adaptive iterative attack towards explainable adversarial robustness
Y Shi, Y Han, Q Zhang, X Kuang
Pattern recognition 105, 107309, 2020
492020
Polishing decision-based adversarial noise with a customized sampling
Y Shi, Y Han, Q Tian
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
352020
Query-efficient black-box adversarial attack with customized iteration and sampling
Y Shi, Y Han, Q Hu, Y Yang, Q Tian
IEEE Transactions on Pattern Analysis and Machine Intelligence 45 (2), 2226-2245, 2022
242022
Exploring uncertainty in regression neural networks for construction of prediction intervals
Y Lai, Y Shi, Y Han, Y Shao, M Qi, B Li
Neurocomputing 481, 249-257, 2022
242022
Decision-based black-box attack against vision transformers via patch-wise adversarial removal
Y Shi, Y Han, Y Tan, X Kuang
Advances in Neural Information Processing Systems 35, 12921-12933, 2022
212022
Exploring uncertainty in deep learning for construction of prediction intervals
Y Lai, Y Shi, Y Han, Y Shao, M Qi, B Li
arXiv preprint arXiv:2104.12953, 2021
102021
Schmidt: Image augmentation for black-box adversarial attack
Y Shi, Y Han
2018 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2018
102018
Source-free and black-box domain adaptation via distributionally adversarial training
Y Shi, K Wu, Y Han, Y Shao, B Li, F Wu
Pattern Recognition 143, 109750, 2023
82023
Domain adaptation without model transferring
K Wu, Y Shi, Y Han, Y Shao, B Li, Q Tian
arXiv preprint arXiv:2107.10174, 2021
62021
Universal perturbation generation for black-box attack using evolutionary algorithms
S Wang, Y Shi, Y Han
2018 24th International Conference on Pattern Recognition (ICPR), 1277-1282, 2018
62018
Extract and merge: Superpixel segmentation with regional attributes
J An, Y Shi, Y Han, M Sun, Q Tian
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
32020
Free Adversarial Training with Layerwise Heuristic Learning
H Zhang, Y Shi, B Dong, Y Han, Y Li, X Kuang
International Conference on Image and Graphics, 120-131, 2021
22021
Active and compact entropy search for high-dimensional Bayesian optimization
R Li, Y Shi, Y Han, Y Shao, M Qi, B Li
IEEE Transactions on Knowledge and Data Engineering 35 (1), 59-70, 2021
22021
Cascade & allocate: A cross-structure adversarial attack against models fusing vision and language
B Zhang, Y Shi, Y Han, Q Hu, W Ding
Information Fusion 104, 102179, 2024
2024
Zero Knowledge Adversarial Defense Via Iterative Translation Cycle
F Jia, Y Shi, Y Han
2021 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2021
2021
Curls & Whey: Boosting Black-Box Adversarial Attacks Supplemental Material
Y Shi, S Wang, Y Han
The system can't perform the operation now. Try again later.
Articles 1–18