default search action
Yi Huang 0013
Person information
- affiliation (PhD 0013): Nanyang Technological University, Singapore
Other persons with the same name
- Yi Huang — disambiguation page
- Yi Huang 0001 — University of Liverpool, Department of Electrical Engineering and Electronics, UK (and 1 more)
- Yi Huang 0002 — Siemens AG, Corporate Technology, Munich, Germany (and 1 more)
- Yi Huang 0003 — McGill University, Department of Atmospheric and Oceanic Science, Montreal, QC, Canada (and 2 more)
- Yi Huang 0004 — Rutgers University, Department of Electrical and Computer Engineering, Piscataway, NJ, USA
- Yi Huang 0005 — Texas A&M University, Department of Computer Science and Engineering, College Station, TX, USA (and 1 more)
- Yi Huang 0006 — Qualcomm R&D, San Diego, CA, USA (and 1 more)
- Yi Huang 0007 — Central South University, School of Information Science and Engineering, Changsha, China
- Yi Huang 0008 — Huazhong University of Science and Technology, School of Automation, Wuhan, China
- Yi Huang 0009 — Tsinghua University, Department of Precision Instrument, Beijing, China (and 1 more)
- Yi Huang 0010 — Chinese Academy of Sciences, Institue of Computing Technology, Beijing, China
- Yi Huang 0011 — Chongqing University of Posts and Telecommunications, College of Electronics Engineering, Chongqing, China
- Yi Huang 0012 — Technical University of Berlin, Germany
- Yi Huang 0014 — Nanyang Technological University, Singapore
- Yi Huang 0015 — Chongqing University of Arts and Sciences, School of Intelligent Manufacturing Engineering, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c10]Yi Huang, Jeremy Styborski, Mingzhi Lyu, Fan Wang, Adams Wai-Kin Kong:
Leveraging Imperfect Restoration for Data Availability Attack. ECCV (73) 2024: 69-86 - [c9]Jeremy Styborski, Mingzhi Lyu, Yi Huang, Adams Wai-Kin Kong:
Exploiting Supervised Poison Vulnerability to Strengthen Self-supervised Defense. ECCV (82) 2024: 265-283 - [i2]Jeremy Styborski, Mingzhi Lyu, Yi Huang, Adams Wai-Kin Kong:
Exploiting Supervised Poison Vulnerability to Strengthen Self-Supervised Defense. CoRR abs/2409.08509 (2024) - 2023
- [c8]Mingzhi Lyu, Yi Huang, Adams Wai-Kin Kong:
Adversarial Attack for Robust Watermark Protection Against Inpainting-based and Blind Watermark Removers. ACM Multimedia 2023: 8396-8405 - 2022
- [c7]Yi Huang, Adams Wai-Kin Kong:
Transferable Adversarial Attack based on Integrated Gradients. ICLR 2022 - [i1]Yi Huang, Adams Wai-Kin Kong:
Transferable Adversarial Attack based on Integrated Gradients. CoRR abs/2205.13152 (2022) - 2021
- [b1]Yi Huang:
Designing adversarial signals against three deep learning and non-deep learning methods. Nanyang Technological University, Singapore, 2021 - 2020
- [c6]Yi Huang, Fan Wang, Adams Wai-Kin Kong, Kwok-Yan Lam:
New Threats Against Object Detector with Non-local Block. ECCV (20) 2020: 481-497
2010 – 2019
- 2019
- [c5]Yi Huang, Adams Wai-Kin Kong, Kwok-Yan Lam:
Adversarial Signboard against Object Detector. BMVC 2019: 231 - [c4]Yi Huang, Adams Wai-Kin Kong, Kwok-Yan Lam:
Attacking Object Detectors Without Changing the Target Object. PRICAI (3) 2019: 3-15 - 2018
- [c3]Yi Huang, Adams Wai-Kin Kong, Kwok-Yan Lam:
From the Perspective of CNN to Adversarial Iris Images. BTAS 2018: 1-10 - 2016
- [c2]Yi Huang, Adams Wai-Kin Kong:
Using a CNN ensemble for detecting pornographic and upskirt images. BTAS 2016: 1-7 - [c1]Qingyong Xu, Soham Ghosh, Xingpeng Xu, Yi Huang, Adams Wai-Kin Kong:
Tattoo detection based on CNN and remarks on the NIST database. ICB 2016: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 20:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint