no code implementations • 25 Oct 2023 • Fan Xing, Xiaoyi Zhou, Xuefeng Fan, Zhuo Tian, Yan Zhao
RAEs are adversarial perturbed images that can be restored to the original.
no code implementations • 9 Aug 2022 • Long Dai, Jiarong Mao, Xuefeng Fan, Xiaoyi Zhou
Specifically, a covert trigger set is established to realize the perception-free verification of the watermarking model, and a novel auxiliary network is designed to improve the robustness and security of the watermarking model.
no code implementations • 6 Jun 2022 • Xuefeng Fan, Dahao Fu, Hangyu Gui, Xinpeng Zhang, Xiaoyi Zhou
Because the existing traceability mechanisms are used for models without watermarks, a small number of false-positives are generated.
no code implementations • 13 Sep 2021 • Xiaoyi Zhou, Liang Huang, Tong Ye, Weiqiang Sun
This paper investigates an unmanned aerial vehicle (UAV)-assisted wireless powered mobile-edge computing (MEC) system, where the UAV powers the mobile terminals by wireless power transfer (WPT) and provides computation service for them.
no code implementations • 23 Jan 2019 • Yiquan Zhang, Bo Peng, Xiaoyi Zhou, Cheng Xiang, Dalei Wang
The performance of the proposed method was evaluated by comparing its efficiency and accuracy with SIMP on a series of typical optimization problems.