Adversarial point cloud perturbations against 3D object detection in autonomous driving systems X Wang, M Cai, F Sohel, N Sang, Z Chang Neurocomputing 466, 27-36, 2021 | 32 | 2021 |
Scale space clustering evolution for salient region detection on 3d deformable shapes X Wang, F Sohel, M Bennamoun, Y Guo, H Lei Pattern Recognition 71, 414-427, 2017 | 29 | 2017 |
Interpretability-guided defense against backdoor attacks to deep neural networks W Jiang, X Wen, J Zhan, X Wang, Z Song IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021 | 21 | 2021 |
Leveraging ordinal regression with soft labels for 3d head pose estimation from point sets S Xiao, N Sang, X Wang, X Ma ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020 | 18 | 2020 |
Diffusion geometry derived keypoints and local descriptors for 3d deformable shape analysis X Wang, M Bennamoun, F Sohel, H Lei Journal of Circuits, Systems and Computers 30 (01), 2150016, 2021 | 15 | 2021 |
Facial expression recognition with machine learning and assessment of distress in patients with cancer L Chen Number 1/January 2021 48 (1), 81-93, 2021 | 15 | 2021 |
Learning a deep regression forest for head pose estimation from a single depth image X Ma, N Sang, S Xiao, X Wang Journal of Circuits, Systems and Computers 30 (08), 2150139, 2021 | 9 | 2021 |
Topology-aware universal adversarial attack on 3D object tracking R Cheng, X Wang, F Sohel, H Lei Visual Intelligence 1 (1), 31, 2023 | 6 | 2023 |
Query-Efficient Generation of Adversarial Examples for Defensive DNNs via Multiobjective Optimization W Jiang, S You, J Zhan, X Wang, H Lei, D Adhikari IEEE Transactions on Evolutionary Computation 27 (4), 832-847, 2022 | 6 | 2022 |
Adaptive security management of real-time storage applications over NAND based storage systems W Jiang, Y Ma, X Zhang, X Wang, Z Shao Journal of Network and Computer Applications 52, 139-153, 2015 | 6 | 2015 |
Deep regression forest with soft-attention for head pose estimation X Ma, N Sang, X Wang, S Xiao 2020 IEEE International Conference on Image Processing (ICIP), 2840-2844, 2020 | 5 | 2020 |
Heat propagation contours for 3D non-rigid shape analysis X Wang, F Sohel, M Bennamoun, H Lei 2016 IEEE Winter Conference on Applications of Computer Vision (WACV), 1-7, 2016 | 5 | 2016 |
Th-net: A method of single 3d object tracking based on transformers and hausdorff distance Z Zhang, N Sang, X Wang ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 4 | 2022 |
Td-Net: Topology Destruction Network For Generating Adversarial Point Cloud J Zhang, C Jiang, X Wang, M Cai 2021 IEEE International Conference on Image Processing (ICIP), 3098-3102, 2021 | 4 | 2021 |
Adversarial point cloud perturbations to attack deep object detection models M Cai, N Sang, X Wang, J Zhang 2020 IEEE 22nd International Conference on High Performance Computing and …, 2020 | 4 | 2020 |
3D hand pose estimation from single depth images with label distribution learning Y Xu, X Wang 2020 IEEE International Conference on Embedded Software and Systems (ICESS), 1-5, 2020 | 3 | 2020 |
CNN Network for Head Detection with Depth Images in cyber-physical systems Q Wang, H Lei, X Ma, S Xiao, X Wang 2020 International Conferences on Internet of Things (iThings) and IEEE …, 2020 | 3 | 2020 |
Deep face verification under pose interference Q WANG, H LEI, X WANG Journal of Computer Applications 43 (2), 595, 2023 | 2 | 2023 |
Non-rigid transformation based adversarial attack against 3d object tracking R Cheng, N Sang, Y Zhou, X Wang ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 2 | 2022 |
Adversary distillation for one-shot attacks on 3D target tracking Z Wang, X Wang, F Sohel, M Bennamoun, Y Liao, J Yu ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 2 | 2022 |