default search action
Siyuan Liang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Feng Zhou, Jicheng Yu, Xiaodong Yin, Changxi Yue, Siyuan Liang:
Mid-Infrared Hollow-Core Waveguide Gas Sensor for Low-Concentration Sulfur Hexafluor Detection. IEEE Access 12: 10886-10892 (2024) - [j8]Xiaodong Yin, Siyuan Liang, Jicheng Yu, Feng Zhou, Junjie Liu:
CNN-Based Digital Twin Model for Ultra-High Voltage Direct Current System Loss Measurement. IEEE Access 12: 70480-70488 (2024) - [j7]Han Zhang, Yiping Dang, Yazhou Zhang, Siyuan Liang, Junxiu Liu, Lixia Ji:
Chinese nested entity recognition method for the finance domain based on heterogeneous graph network. Inf. Process. Manag. 61(5): 103812 (2024) - [c32]Cong Wang, Jinshan Pan, Wei Wang, Gang Fu, Siyuan Liang, Mengzhu Wang, Xiao-Ming Wu, Jun Liu:
Correlation Matching Transformation Transformers for UHD Image Restoration. AAAI 2024: 5336-5344 - [c31]Xinwei Liu, Xiaojun Jia, Jindong Gu, Yuan Xun, Siyuan Liang, Xiaochun Cao:
Does Few-Shot Learning Suffer from Backdoor Attacks? AAAI 2024: 19893-19901 - [c30]Longkang Li, Siyuan Liang, Zihao Zhu, Chris Ding, Hongyuan Zha, Baoyuan Wu:
Learning to Optimize Permutation Flow Shop Scheduling via Graph-Based Imitation Learning. AAAI 2024: 20185-20193 - [c29]Ruoyu Chen, Hua Zhang, Siyuan Liang, Jingzhi Li, Xiaochun Cao:
Less is More: Fewer Interpretable Region via Submodular Subset Selection. ICLR 2024 - [c28]Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao:
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection. ICLR 2024 - [i37]Xinwei Liu, Xiaojun Jia, Jindong Gu, Yuan Xun, Siyuan Liang, Xiaochun Cao:
Does Few-shot Learning Suffer from Backdoor Attacks? CoRR abs/2401.01377 (2024) - [i36]Ruoyu Chen, Hua Zhang, Siyuan Liang, Jingzhi Li, Xiaochun Cao:
Less is More: Fewer Interpretable Region via Submodular Subset Selection. CoRR abs/2402.09164 (2024) - [i35]Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao:
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection. CoRR abs/2402.11473 (2024) - [i34]Jiawei Liang, Siyuan Liang, Man Luo, Aishan Liu, Dongchen Han, Ee-Chien Chang, Xiaochun Cao:
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models. CoRR abs/2402.13851 (2024) - [i33]Xiaoxia Li, Siyuan Liang, Jiyi Zhang, Han Fang, Aishan Liu, Ee-Chien Chang:
Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs. CoRR abs/2402.14872 (2024) - [i32]Tianrui Lou, Xiaojun Jia, Jindong Gu, Li Liu, Siyuan Liang, Bangyan He, Xiaochun Cao:
Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds. CoRR abs/2403.05247 (2024) - [i31]Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao:
Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning. CoRR abs/2403.16257 (2024) - [i30]Siyuan Liang, Wei Wang, Ruoyu Chen, Aishan Liu, Boxi Wu, Ee-Chien Chang, Xiaochun Cao, Dacheng Tao:
Object Detectors in the Open Environment: Challenges, Solutions, and Outlook. CoRR abs/2403.16271 (2024) - [i29]Xinwei Zhang, Aishan Liu, Tianyuan Zhang, Siyuan Liang, Xianglong Liu:
Towards Robust Physical-world Backdoor Attacks on Lane Detection. CoRR abs/2405.05553 (2024) - [i28]Dehong Kong, Siyuan Liang, Wenqi Ren:
Environmental Matching Attack Against Unmanned Aerial Vehicles Object Detection. CoRR abs/2405.07595 (2024) - [i27]Mingli Zhu, Siyuan Liang, Baoyuan Wu:
Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack. CoRR abs/2405.16134 (2024) - [i26]Cong Wang, Jinshan Pan, Wei Wang, Gang Fu, Siyuan Liang, Mengzhu Wang, Xiao-Ming Wu, Jun Liu:
Correlation Matching Transformation Transformers for UHD Image Restoration. CoRR abs/2406.00629 (2024) - [i25]Tianyuan Zhang, Lu Wang, Hainan Li, Yisong Xiao, Siyuan Liang, Aishan Liu, Xianglong Liu, Dacheng Tao:
LanEvil: Benchmarking the Robustness of Lane Detection to Environmental Illusions. CoRR abs/2406.00934 (2024) - [i24]Zonghao Ying, Aishan Liu, Tianyuan Zhang, Zhengmin Yu, Siyuan Liang, Xianglong Liu, Dacheng Tao:
Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt. CoRR abs/2406.04031 (2024) - [i23]Siyuan Liang, Jiawei Liang, Tianyu Pang, Chao Du, Aishan Liu, Ee-Chien Chang, Xiaochun Cao:
Revisiting Backdoor Attacks against Large Vision-Language Models. CoRR abs/2406.18844 (2024) - [i22]Yisong Xiao, Aishan Liu, QianJia Cheng, Zhenfei Yin, Siyuan Liang, Jiapeng Li, Jing Shao, Xianglong Liu, Dacheng Tao:
GenderBias-VL: Benchmarking Gender Bias in Vision Language Models via Counterfactual Probing. CoRR abs/2407.00600 (2024) - [i21]Xinwei Liu, Xiaojun Jia, Yuan Xun, Siyuan Liang, Xiaochun Cao:
Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning. CoRR abs/2407.16307 (2024) - [i20]Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao:
Compromising Embodied Agents with Contextual Backdoor Attacks. CoRR abs/2408.02882 (2024) - 2023
- [j6]Jicheng Yu, Siyuan Liang, Yinglong Diao, Changxi Yue, Xiaodong Yin, Feng Zhou, Youhui Qiu, Jiangchao Qin:
Real-Time Monitoring Method for Thyristor Losses in Ultra High Voltage Converter Station Based on Wavelet Optimized GA-BP Neural Network. IEEE Access 11: 109553-109563 (2023) - [j5]Bingjie Zhang, Baolu Gao, Siyuan Liang, Xiaoyang Li, Hao Wang:
A classification algorithm based on improved meta learning and transfer learning for few-shot medical images. IET Image Process. 17(12): 3589-3598 (2023) - [j4]Siyuan Liang, Rongrong Chen, Guodong Duan, Jianbo Du:
Deep learning-based lightweight radar target detection method. J. Real Time Image Process. 20(4): 61 (2023) - [j3]Jingzhi Li, Hua Zhang, Siyuan Liang, Pengwen Dai, Xiaochun Cao:
Privacy-Enhancing Face Obfuscation Guided by Semantic-Aware Attribution Maps. IEEE Trans. Inf. Forensics Secur. 18: 3632-3646 (2023) - [c27]Bangyan He, Jian Liu, Yiming Li, Siyuan Liang, Jingzhi Li, Xiaojun Jia, Xiaochun Cao:
Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization. AAAI 2023: 764-772 - [c26]Chunyu Sun, Chenye Xu, Chengyuan Yao, Siyuan Liang, Yichao Wu, Ding Liang, Xianglong Liu, Aishan Liu:
Improving Robust Fariness via Balance Adversarial Training. AAAI 2023: 15161-15169 - [c25]Zhiyuan Wang, Zeliang Zhang, Siyuan Liang, Xiaosen Wang:
Diversifying the High-level Features for better Adversarial Transferability. BMVC 2023: 70-76 - [c24]Jianbo Chen, Xinwei Liu, Siyuan Liang, Xiaojun Jia, Yuan Xun:
Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection. CVPR Workshops 2023: 2322-2329 - [c23]Aishan Liu, Shiyu Tang, Siyuan Liang, Ruihao Gong, Boxi Wu, Xianglong Liu, Dacheng Tao:
Exploring the Relationship Between Architectural Design and Adversarially Robust Generalization. CVPR 2023: 4096-4107 - [c22]Siyuan Liang, Baolu Gao, Bingjie Zhang, Xiaoyang Li, Hao Wang:
The Progressive Detectors and Discriminative Feature Descriptors Combining Global and Local Information. ICANN (9) 2023: 439-455 - [c21]Siyuan Liang, Meng Lian, Mengchu Li, Tsun-Ming Tseng, Ulf Schlichtmann, Tsung-Yi Ho:
ARMM: Adaptive Reliability Quantification Model of Microfluidic Designs and its Graph-Transformer-Based Implementation. ICCAD 2023: 1-9 - [c20]Xin Dong, Rui Wang, Siyuan Liang, Aishan Liu, Lihua Jing:
Face Encryption via Frequency-Restricted Identity-Agnostic Attacks. ACM Multimedia 2023: 579-588 - [c19]Jiawei Liang, Siyuan Liang, Aishan Liu, Ke Ma, Jingzhi Li, Xiaochun Cao:
Exploring Inconsistent Knowledge Distillation for Object Detection with Data Augmentation. ACM Multimedia 2023: 768-778 - [c18]Jun Guo, Xingyu Zheng, Aishan Liu, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu:
Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks. ACM Multimedia 2023: 4178-4189 - [c17]Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao:
X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection. USENIX Security Symposium 2023: 3781-3798 - [c16]Siyuan Liang, Wenxi Li, Guodong Duan, Pengbo Chen, Rui Gong:
Semantic map construction based on LIDAR and vision fusion. VTC Fall 2023: 1-5 - [i19]Siyuan Liang, Long Huo, Xin Chen, Peiyuan Sun:
Optimal Inter-area Oscillation Damping Control: A Transfer Deep Reinforcement Learning Approach with Switching Control Strategy. CoRR abs/2301.09321 (2023) - [i18]Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao:
X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection. CoRR abs/2302.09491 (2023) - [i17]Zhiyuan Wang, Zeliang Zhang, Siyuan Liang, Xiaosen Wang:
Diversifying the High-level Features for better Adversarial Transferability. CoRR abs/2304.10136 (2023) - [i16]Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu:
Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks. CoRR abs/2308.00958 (2023) - [i15]Jiayang Liu, Siyu Zhu, Siyuan Liang, Jie Zhang, Han Fang, Weiming Zhang, Ee-Chien Chang:
Improving Adversarial Transferability by Stable Diffusion. CoRR abs/2311.11017 (2023) - [i14]Bangyan He, Xiaojun Jia, Siyuan Liang, Tianrui Lou, Yang Liu, Xiaochun Cao:
SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation. CoRR abs/2312.04913 (2023) - [i13]Aishan Liu, Xinwei Zhang, Yisong Xiao, Yuguang Zhou, Siyuan Liang, Jiakai Wang, Xianglong Liu, Xiaochun Cao, Dacheng Tao:
Pre-trained Trojan Attacks for Visual Recognition. CoRR abs/2312.15172 (2023) - 2022
- [j2]Siyuan Liang, Hao Wu, Li Zhen, Qiaozhi Hua, Sahil Garg, Georges Kaddoum, Mohammad Mehedi Hassan, Keping Yu:
Edge YOLO: Real-Time Intelligent Object Detection System Based on Edge-Cloud Cooperation in Autonomous Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 25345-25360 (2022) - [c15]Yun Zhang, Siyuan Liang, Chunting Wang, Feng Zhao:
Channel Estimation Algorithm of OFDM-RoF System in 5G Mobile Front-end Network Based on Artificial Neural Network. AIPR 2022: 1113-1119 - [c14]Zhi Lv, Bo Lin, Siyuan Liang, Lihua Wang, Mochen Yu, Yao Tang, Jiajun Liang:
SimpleDG: Simple Domain Generalization Baseline Without Bells and Whistles. ECCV Workshops (6) 2022: 477-487 - [c13]Siyuan Liang, Longkang Li, Yanbo Fan, Xiaojun Jia, Jingzhi Li, Baoyuan Wu, Xiaochun Cao:
A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection. ECCV (4) 2022: 619-636 - [c12]Siyuan Liang, Chunting Wang, Haotong Cao, Jie Feng, Wenle Sun:
Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON System in Industrial Internet Based on Compressed Sensing. ICC Workshops 2022: 1189-1194 - [c11]Siyuan Liang, Mengchu Li, Tsun-Ming Tseng, Ulf Schlichtmann, Tsung-Yi Ho:
CoMUX: Combinatorial-Coding-Based High-Performance Microfluidic Control Multiplexer Design. ICCAD 2022: 116:1-116:9 - [c10]Siyuan Liang, Aishan Liu, Jiawei Liang, Longkang Li, Yang Bai, Xiaochun Cao:
Imitated Detectors: Stealing Knowledge of Black-box Object Detectors. ACM Multimedia 2022: 4839-4847 - [i12]Siyuan Liang, Baoyuan Wu, Yanbo Fan, Xingxing Wei, Xiaochun Cao:
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection. CoRR abs/2201.08970 (2022) - [i11]Peiyuan Sun, Long Huo, Siyuan Liang, Xin Chen:
Fast Transient Stability Prediction Using Grid-informed Temporal and Topological Embedding Deep Neural Network. CoRR abs/2201.09245 (2022) - [i10]Siyuan Liang, Hao Wu:
Edge YOLO: Real-Time Intelligent Object Detection System Based on Edge-Cloud Cooperation in Autonomous Vehicles. CoRR abs/2205.14942 (2022) - [i9]Yuhang Wang, Huafeng Shi, Rui Min, Ruijia Wu, Siyuan Liang, Yichao Wu, Ding Liang, Aishan Liu:
Adaptive Perturbation Generation for Multiple Backdoors Detection. CoRR abs/2209.05244 (2022) - [i8]Chunyu Sun, Chenye Xu, Chengyuan Yao, Siyuan Liang, Yichao Wu, Ding Liang, Xianglong Liu, Aishan Liu:
Improving Robust Fairness via Balance Adversarial Training. CoRR abs/2209.07534 (2022) - [i7]Siyuan Liang, Longkang Li, Yanbo Fan, Xiaojun Jia, Jingzhi Li, Baoyuan Wu, Xiaochun Cao:
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection. CoRR abs/2209.07790 (2022) - [i6]Jiawei Liang, Siyuan Liang, Aishan Liu, Mingli Zhu, Danni Yuan, Chenye Xu, Xiaochun Cao:
Rethinking Data Augmentation in Knowledge Distillation for Object Detection. CoRR abs/2209.09841 (2022) - [i5]Shiyu Tang, Siyuan Liang, Ruihao Gong, Aishan Liu, Xianglong Liu, Dacheng Tao:
Exploring the Relationship between Architecture and Adversarially Robust Generalization. CoRR abs/2209.14105 (2022) - [i4]Zhi Lv, Bo Lin, Siyuan Liang, Lihua Wang, Mochen Yu, Yao Tang, Jiajun Liang:
SimpleDG: Simple Domain Generalization Baseline without Bells and Whistles. CoRR abs/2210.14507 (2022) - [i3]Longkang Li, Siyuan Liang, Zihao Zhu, Xiaochun Cao, Chris Ding, Hongyuan Zha, Baoyuan Wu:
Learning to Optimize Permutation Flow Shop Scheduling via Graph-based Imitation Learning. CoRR abs/2210.17178 (2022) - 2021
- [c9]Siyuan Liang, Xuefen Wang, Jianbo Du, Feng Zhao, Haotong Cao:
LMS Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON Systems in 5G-Enabled Industrial Internet. GLOBECOM (Workshops) 2021: 1-6 - [c8]Siyuan Liang, Qing Tian, Guofei Gao, Xuanchuan Zheng:
Realization of comprehensive monitoring and friendly evaluation system for gas environment of rail transit station. ICAIIS 2021: 147:1-147:8 - [c7]Xu He, Zhongzheng Ning, Siyuan Liang, Jianbo Du, Ting Nie:
Energy Balanced Clustering Routing Protocol for Wireless Sensor Networks. ICCC Workshops 2021: 137-142 - [c6]Siyuan Liang, Baoyuan Wu, Yanbo Fan, Xingxing Wei, Xiaochun Cao:
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection. ICCV 2021: 7677-7687 - 2020
- [j1]Siyuan Liang, Weilong Zhu, Feng Zhao, Congyi Wang:
High-Efficiency Wavelet Compressive Fusion for Improving MEMS Array Performance. Sensors 20(6): 1662 (2020) - [c5]Siyuan Liang, Xingxing Wei, Siyuan Yao, Xiaochun Cao:
Efficient Adversarial Attacks for Visual Object Tracking. ECCV (26) 2020: 34-50 - [i2]Siyuan Liang, Xingxing Wei, Siyuan Yao, Xiaochun Cao:
Efficient Adversarial Attacks for Visual Object Tracking. CoRR abs/2008.00217 (2020)
2010 – 2019
- 2019
- [c4]Xingxing Wei, Siyuan Liang, Ning Chen, Xiaochun Cao:
Transferable Adversarial Attacks for Image and Video Object Detection. IJCAI 2019: 954-960 - 2018
- [c3]Caiyun Yang, Jianqiang Li, Ji-Jiang Yang, Shi Chen, Qing Wang, Hui Pan, Siyuan Liang, Weiliang Qiu:
Differentially Variable Genes of Oral Squamous Cell Carcinoma. ICCSE 2018: 22:1-22:6 - [c2]Kang Li, Bo Jiu, Hongwei Liu, Siyuan Liang:
Reinforcement Learning based Anti-jamming Frequency Hopping Strategies Design for Cognitive Radar. ICSPCC 2018: 1-5 - [i1]Xingxing Wei, Siyuan Liang, Xiaochun Cao, Jun Zhu:
Transferable Adversarial Attacks for Image and Video Object Detection. CoRR abs/1811.12641 (2018) - 2017
- [c1]Siyuan Liang, Jianqiang Li, Juan Li, Caiyun Yang, Weiliang Qiu, Ji-Jiang Yang, Zhihua Sun, Rui Mao:
Alcohol-Induced Differential Variable Genes. COMPSAC (2) 2017: 215-220
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-29 00:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint