


default search action
Xupeng Wang 0001
Person information
- affiliation (PhD 2018): University of Electronic Science and Technology of China, School of Information and Software Engineering, Chengdu, Sichuan, China
- affiliation (2014-2016): University of Western Australia, School of Computer Science and Software Engineering, Perth, Crawley, WA, Australia
Other persons with the same name
- Xupeng Wang — disambiguation page
- Xupeng Wang 0002
— Xi'an University of Technology, Research Center for Civil-Military Integration and Protection Equipment Design Innovation, China
- Xupeng Wang 0003 — Ocean University of China, Department of Computer Science and Technology, Qingdao, Shandong, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Qi Wang, Hang Lei, Gun Li, Xupeng Wang, Lu Chen
:
A Novel Convolutional Neural Network for Head Detection and Pose Estimation in Complex Environments from Single-Depth Images. Cogn. Comput. 16(4): 2116-2129 (2024) - [j10]Mumuxin Cai, Xupeng Wang
, Ferdous Sohel
, Hang Lei:
Diffusion Models-Based Purification for Common Corruptions on Robust 3D Object Detection. Sensors 24(16): 5440 (2024) - [j9]Wei Jiang
, Xiangyu Wen
, Jinyu Zhan
, Xupeng Wang
, Ziwei Song
, Chen Bian
:
Critical Path-Based Backdoor Detection for Deep Neural Networks. IEEE Trans. Neural Networks Learn. Syst. 35(3): 4032-4046 (2024) - 2023
- [j8]Wei Jiang
, Shen You
, Jinyu Zhan
, Xupeng Wang
, Hong Lei, Deepak Adhikari
:
Query-Efficient Generation of Adversarial Examples for Defensive DNNs via Multiobjective Optimization. IEEE Trans. Evol. Comput. 27(4): 832-847 (2023) - [j7]Riran Cheng
, Xupeng Wang
, Ferdous Sohel
, Hang Lei:
Topology-aware universal adversarial attack on 3D object tracking. Vis. Intell. 1(1) (2023) - [c18]Zihao Zhang, Nan Sang, Xupeng Wang, Mumuxin Cai:
SC-Net: Salient Point and Curvature Based Adversarial Point Cloud Generation Network. ICASSP 2023: 1-5 - 2022
- [j6]Wei Jiang
, Xiangyu Wen
, Jinyu Zhan
, Xupeng Wang, Ziwei Song
:
Interpretability-Guided Defense Against Backdoor Attacks to Deep Neural Networks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(8): 2611-2624 (2022) - [c17]Zihao Zhang, Nan Sang, Xupeng Wang
:
TH-Net: A Method Of Single 3d Object Tracking Based On Transformers And Hausdorff Distance. ICASSP 2022: 2280-2284 - [c16]Riran Cheng
, Nan Sang, Yinyuan Zhou, Xupeng Wang
:
Non-Rigid Transformation Based Adversarial Attack Against 3d Object Tracking. ICASSP 2022: 2744-2748 - [c15]Zhengyi Wang, Xupeng Wang
, Ferdous Sohel
, Mohammed Bennamoun
, Yong Liao, Jiali Yu:
Adversary Distillation for One-Shot Attacks on 3D Target Tracking. ICASSP 2022: 2749-2453 - 2021
- [j5]Xupeng Wang
, Mumuxin Cai, Ferdous Sohel
, Nan Sang, Zhengwei Chang:
Adversarial point cloud perturbations against 3D object detection in autonomous driving systems. Neurocomputing 466: 27-36 (2021) - [j4]Xupeng Wang
, Mohammed Bennamoun
, Ferdous Sohel
, Hang Lei:
Diffusion Geometry Derived Keypoints and Local Descriptors for 3D Deformable Shape Analysis. J. Circuits Syst. Comput. 30(1): 2150016:1-2150016:28 (2021) - [j3]Xiangtian Ma, Nan Sang, Shihua Xiao, Xupeng Wang
:
Learning a Deep Regression Forest for Head Pose Estimation from a Single Depth Image. J. Circuits Syst. Comput. 30(8): 2150139:1-2150139:15 (2021) - [c14]Riran Cheng
, Nan Sang, Yinyuan Zhou, Xupeng Wang
:
Universal Adversarial Attack Against 3D Object Tracking. HPCC/DSS/SmartCity/DependSys 2021: 34-40 - [c13]Jingyu Zhang, Chunhua Jiang, Xupeng Wang
, Mumuxin Cai:
Td-Net: Topology Destruction Network For Generating Adversarial Point Cloud. ICIP 2021: 3098-3102 - [c12]Zhengyi Wang, Xupeng Wang
, Ferdous Sohel
, Yong Liao:
PD-Net: Point Dropping Network for Flexible Adversarial Example Generation with $L_{0}$ Regularization. IJCNN 2021: 1-7 - 2020
- [c11]Zhiyuan He, Wei Jiang, Jinyu Zhan, Xupeng Wang, Xiangyu Wen
:
Heatmap-Aware Low-Cost Design to Resist Adversarial Attacks: Work-in-Progress. CODES+ISSS 2020: 32-33 - [c10]Xiangyu Wen
, Wei Jiang, Jinyu Zhan, Xupeng Wang, Zhiyuan He:
Interpretability Derived Backdoor Attacks Detection in Deep Neural Networks: Work-in-Progress. EMSOFT 2020: 13-14 - [c9]Mumuxin Cai, Nan Sang, Xupeng Wang
, Jingyu Zhang:
Adversarial point cloud perturbations to attack deep object detection models. HPCC/DSS/SmartCity 2020: 1042-1049 - [c8]Shihua Xiao, Nan Sang, Xupeng Wang
, Xiangtian Ma:
Leveraging Ordinal Regression With Soft Labels For 3d Head Pose Estimation From Point Sets. ICASSP 2020: 1883-1887 - [c7]Yuanfei Xu, Xupeng Wang:
3D Hand Pose Estimation from Single Depth Images with Label Distribution Learning. ICESS 2020: 1-5 - [c6]Xiangtian Ma, Nan Sang, Xupeng Wang
, Shihua Xiao:
Deep Regression Forest with Soft-Attention for Head Pose Estimation. ICIP 2020: 2840-2844 - [c5]Qi Wang, Hang Lei, Xiangtian Ma, Shihua Xiao, Xupeng Wang:
CNN Network for Head Detection with Depth Images in cyber-physical systems. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 544-549
2010 – 2019
- 2017
- [j2]Xupeng Wang
, Ferdous Ahmed Sohel
, Mohammed Bennamoun
, Yulan Guo, Hang Lei:
Scale space clustering evolution for salient region detection on 3D deformable shapes. Pattern Recognit. 71: 414-427 (2017) - [c4]Xupeng Wang, Ferdous Ahmed Sohel, Mohammed Bennamoun
, Yulan Guo, Hang Lei:
Persistence-based Interest Point Detection for 3D Deformable Surface. VISIGRAPP (1: GRAPP) 2017: 58-69 - 2016
- [c3]Xupeng Wang, Ferdous Ahmed Sohel
, Mohammed Bennamoun
, Hang Lei:
Heat propagation contours for 3D non-rigid shape analysis. WACV 2016: 1-7 - 2015
- [j1]Wei Jiang, Yue Ma, Xia Zhang, Xupeng Wang
, Zili Shao
:
Adaptive security management of real-time storage applications over NAND based storage systems. J. Netw. Comput. Appl. 52: 139-153 (2015) - [c2]Xupeng Wang, Ferdous Ahmed Sohel
, Mohammed Bennamoun
, Hang Lei:
Binary Descriptor Based on Heat Diffusion for Non-rigid Shape Analysis. PSIVT 2015: 751-761 - 2013
- [c1]Wei Jiang, Yue Ma, Xia Zhang, Xupeng Wang, Zili Shao
:
Online optimization of security-sensitive real-time storage applications for NAND flash memory storage systems. RTCSA 2013: 121-130
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint