


Остановите войну!
for scientists:
Cihang Xie
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i31]Yuyin Zhou, Xianhang Li, Fengze Liu, Xuxi Chen, Lequan Yu, Cihang Xie, Matthew P. Lungren, Lei Xing:
Learning to Bootstrap for Combating Label Noise. CoRR abs/2202.04291 (2022) - [i30]Jieru Mei, Yucheng Han, Yutong Bai, Yixiao Zhang, Yingwei Li, Xianhang Li, Alan L. Yuille, Cihang Xie:
Fast AdvProp. CoRR abs/2204.09838 (2022) - [i29]Xianhang Li, Huiyu Wang, Chen Wei, Jieru Mei, Alan L. Yuille, Yuyin Zhou, Cihang Xie:
In Defense of Image Pre-Training for Spatiotemporal Recognition. CoRR abs/2205.01721 (2022) - [i28]Sizhe Chen, Zhehao Huang, Qinghua Tao, Yingwen Wu, Cihang Xie, Xiaolin Huang:
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks. CoRR abs/2205.12134 (2022) - [i27]Shutong Wu, Sizhe Chen, Cihang Xie, Xiaolin Huang:
One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks. CoRR abs/2205.12141 (2022) - [i26]Zeyu Wang, Yutong Bai, Yuyin Zhou, Cihang Xie:
Can CNNs Be More Robust Than Transformers? CoRR abs/2206.03452 (2022) - [i25]Sucheng Ren, Huiyu Wang, Zhengqi Gao, Shengfeng He, Alan L. Yuille, Yuyin Zhou, Cihang Xie:
A Simple Data Mixing Prior for Improving Self-Supervised Learning. CoRR abs/2206.07692 (2022) - 2021
- [c18]Xiangning Chen, Cihang Xie, Mingxing Tan, Li Zhang, Cho-Jui Hsieh, Boqing Gong:
Robust and Accurate Object Detection via Adversarial Learning. CVPR 2021: 16622-16631 - [c17]Zhuowan Li, Elias Stengel-Eskin, Yixiao Zhang, Cihang Xie, Quan Tran, Benjamin Van Durme, Alan L. Yuille:
Calibrating Concepts and Operations: Towards Symbolic Reasoning on Real Images. ICCV 2021: 14890-14899 - [c16]Yingwei Li, Qihang Yu, Mingxing Tan, Jieru Mei, Peng Tang, Wei Shen, Alan L. Yuille, Cihang Xie:
Shape-Texture Debiased Neural Network Training. ICLR 2021 - [c15]Yutong Bai, Jieru Mei, Alan L. Yuille, Cihang Xie:
Are Transformers more robust than CNNs? NeurIPS 2021: 26831-26843 - [i24]Xiangning Chen, Cihang Xie, Mingxing Tan, Li Zhang, Cho-Jui Hsieh, Boqing Gong:
Robust and Accurate Object Detection via Adversarial Learning. CoRR abs/2103.13886 (2021) - [i23]Nataniel Ruiz, Adam Kortylewski, Weichao Qiu, Cihang Xie, Sarah Adel Bargal, Alan L. Yuille, Stan Sclaroff:
Simulated Adversarial Testing of Face Recognition Models. CoRR abs/2106.04569 (2021) - [i22]Zhuowan Li, Elias Stengel-Eskin, Yixiao Zhang, Cihang Xie, Quan Tran, Benjamin Van Durme, Alan L. Yuille:
Calibrating Concepts and Operations: Towards Symbolic Reasoning on Real Images. CoRR abs/2110.00519 (2021) - [i21]Yutong Bai, Jieru Mei, Alan L. Yuille, Cihang Xie:
Are Transformers More Robust Than CNNs? CoRR abs/2111.05464 (2021) - [i20]Jinghao Zhou, Chen Wei, Huiyu Wang, Wei Shen, Cihang Xie, Alan L. Yuille, Tao Kong:
iBOT: Image BERT Pre-Training with Online Tokenizer. CoRR abs/2111.07832 (2021) - 2020
- [c14]Yingwei Li, Song Bai, Yuyin Zhou, Cihang Xie, Zhishuai Zhang, Alan L. Yuille:
Learning Transferable Adversarial Examples via Ghost Networks. AAAI 2020: 11458-11465 - [c13]Lifeng Huang, Chengying Gao, Yuyin Zhou, Cihang Xie, Alan L. Yuille
, Changqing Zou, Ning Liu:
Universal Physical Camouflage Attacks on Object Detectors. CVPR 2020: 717-726 - [c12]Cihang Xie, Mingxing Tan, Boqing Gong, Jiang Wang, Alan L. Yuille
, Quoc V. Le:
Adversarial Examples Improve Image Recognition. CVPR 2020: 816-825 - [c11]Yingwei Li, Xiaojie Jin, Jieru Mei, Xiaochen Lian, Linjie Yang, Cihang Xie, Qihang Yu, Yuyin Zhou, Song Bai, Alan L. Yuille
:
Neural Architecture Search for Lightweight Non-Local Networks. CVPR 2020: 10294-10303 - [c10]Chenglin Yang, Adam Kortylewski, Cihang Xie, Yinzhi Cao, Alan L. Yuille
:
PatchAttack: A Black-Box Texture-Based Attack with Reinforcement Learning. ECCV (26) 2020: 681-698 - [c9]Yingwei Li, Song Bai, Cihang Xie, Zhenyu Liao, Xiaohui Shen, Alan L. Yuille
:
Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. ECCV (11) 2020: 795-813 - [c8]Cihang Xie, Alan L. Yuille:
Intriguing Properties of Adversarial Training at Scale. ICLR 2020 - [i19]Yingwei Li, Xiaojie Jin, Jieru Mei, Xiaochen Lian, Linjie Yang, Cihang Xie, Qihang Yu, Yuyin Zhou, Song Bai, Alan L. Yuille:
Neural Architecture Search for Lightweight Non-Local Networks. CoRR abs/2004.01961 (2020) - [i18]Chenglin Yang, Adam Kortylewski, Cihang Xie, Yinzhi Cao, Alan L. Yuille:
PatchAttack: A Black-box Texture-based Attack with Reinforcement Learning. CoRR abs/2004.05682 (2020) - [i17]Cihang Xie, Mingxing Tan, Boqing Gong, Alan L. Yuille, Quoc V. Le:
Smooth Adversarial Training. CoRR abs/2006.14536 (2020) - [i16]Yingwei Li, Qihang Yu, Mingxing Tan, Jieru Mei, Peng Tang, Wei Shen, Alan L. Yuille, Cihang Xie:
Shape-Texture Debiased Neural Network Training. CoRR abs/2010.05981 (2020) - [i15]Yuhui Xu, Lingxi Xie, Cihang Xie, Jieru Mei, Siyuan Qiao, Wei Shen, Hongkai Xiong, Alan L. Yuille:
Batch Normalization with Enhanced Linear Transformation. CoRR abs/2011.14150 (2020)
2010 – 2019
- 2019
- [c7]Cihang Xie, Yuxin Wu, Laurens van der Maaten, Alan L. Yuille
, Kaiming He:
Feature Denoising for Improving Adversarial Robustness. CVPR 2019: 501-509 - [c6]Cihang Xie, Zhishuai Zhang, Yuyin Zhou, Song Bai, Jianyu Wang, Zhou Ren, Alan L. Yuille
:
Improving Transferability of Adversarial Examples With Input Diversity. CVPR 2019: 2730-2739 - [i14]Yingwei Li, Song Bai, Cihang Xie, Zhenyu Liao, Xiaohui Shen, Alan L. Yuille:
Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. CoRR abs/1904.00979 (2019) - [i13]Cihang Xie, Alan L. Yuille:
Intriguing properties of adversarial training. CoRR abs/1906.03787 (2019) - [i12]Lifeng Huang, Chengying Gao, Yuyin Zhou, Changqing Zou, Cihang Xie, Alan L. Yuille, Ning Liu:
UPC: Learning Universal Physical Camouflage Attacks on Object Detectors. CoRR abs/1909.04326 (2019) - [i11]Cihang Xie, Mingxing Tan, Boqing Gong, Jiang Wang, Alan L. Yuille, Quoc V. Le:
Adversarial Examples Improve Image Recognition. CoRR abs/1911.09665 (2019) - 2018
- [c5]Zhishuai Zhang, Cihang Xie, Jianyu Wang, Lingxi Xie, Alan L. Yuille
:
DeepVoting: A Robust and Explainable Deep Network for Semantic Part Detection Under Partial Occlusion. CVPR 2018: 1372-1380 - [c4]Zhishuai Zhang, Siyuan Qiao, Cihang Xie, Wei Shen, Bo Wang
, Alan L. Yuille
:
Single-Shot Object Detection With Enriched Semantics. CVPR 2018: 5813-5821 - [c3]Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan L. Yuille:
Mitigating Adversarial Effects Through Randomization. ICLR (Poster) 2018 - [i10]Cihang Xie, Zhishuai Zhang, Jianyu Wang, Yuyin Zhou, Zhou Ren, Alan L. Yuille:
Improving Transferability of Adversarial Examples with Input Diversity. CoRR abs/1803.06978 (2018) - [i9]Alexey Kurakin, Ian J. Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan L. Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe:
Adversarial Attacks and Defences Competition. CoRR abs/1804.00097 (2018) - [i8]Cihang Xie, Yuxin Wu, Laurens van der Maaten, Alan L. Yuille, Kaiming He:
Feature Denoising for Improving Adversarial Robustness. CoRR abs/1812.03411 (2018) - [i7]Yingwei Li, Song Bai, Yuyin Zhou, Cihang Xie, Zhishuai Zhang, Alan L. Yuille:
Learning Transferable Adversarial Examples via Ghost Networks. CoRR abs/1812.03413 (2018) - 2017
- [c2]Jianyu Wang, Zhishuai Zhang, Cihang Xie, Jun Zhu, Lingxi Xie, Alan L. Yuille:
Detecting Semantic Parts on Partially Occluded Objects. BMVC 2017 - [c1]Cihang Xie, Jianyu Wang, Zhishuai Zhang, Yuyin Zhou, Lingxi Xie, Alan L. Yuille
:
Adversarial Examples for Semantic Segmentation and Object Detection. ICCV 2017: 1378-1387 - [i6]Cihang Xie, Jianyu Wang, Zhishuai Zhang, Yuyin Zhou, Lingxi Xie, Alan L. Yuille:
Adversarial Examples for Semantic Segmentation and Object Detection. CoRR abs/1703.08603 (2017) - [i5]Jianyu Wang, Cihang Xie, Zhishuai Zhang, Jun Zhu, Lingxi Xie, Alan L. Yuille:
Detecting Semantic Parts on Partially Occluded Objects. CoRR abs/1707.07819 (2017) - [i4]Zhishuai Zhang, Cihang Xie, Jianyu Wang, Lingxi Xie, Alan L. Yuille:
DeepVoting: An Explainable Framework for Semantic Part Detection under Partial Occlusion. CoRR abs/1709.04577 (2017) - [i3]Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan L. Yuille:
Mitigating adversarial effects through randomization. CoRR abs/1711.01991 (2017) - [i2]Jianyu Wang, Zhishuai Zhang, Cihang Xie, Yuyin Zhou, Vittal Premachandran, Jun Zhu, Lingxi Xie, Alan L. Yuille:
Visual Concepts and Compositional Voting. CoRR abs/1711.04451 (2017) - [i1]Zhishuai Zhang, Siyuan Qiao, Cihang Xie, Wei Shen, Bo Wang, Alan L. Yuille:
Single-Shot Object Detection with Enriched Semantics. CoRR abs/1712.00433 (2017) - 2016
- [j1]Lei Zhang, Cihang Xie, Tao Jiang, Junyang Shen, Qi Qi, Dexiang Meng:
Prediction-based MAC-layer sensing in cognitive radio networks. Wirel. Commun. Mob. Comput. 16(2): 128-136 (2016)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-06-22 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint