Shu-Tao Xia
Cited by
Cited by
Second-order attention network for single image super-resolution
T Dai, J Cai, Y Zhang, ST Xia, L Zhang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, S Erfani, S Xia, S Wijewickrema, ...
International Conference on Machine Learning, 3355-3364, 2018
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE conference on computer vision and pattern …, 2018
Adversarial weight perturbation helps robust generalization
D Wu, ST Xia, Y Wang
Advances in Neural Information Processing Systems 33, 2958-2969, 2020
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
Johnson type bounds on constant dimension codes
ST Xia, FW Fu
Designs, Codes and Cryptography 50 (2), 163-172, 2009
Maintaining discrimination and fairness in class incremental learning
B Zhao, X Xiao, G Gan, B Zhang, ST Xia
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
Backdoor learning: A survey
Y Li, Y Jiang, Z Li, ST Xia
IEEE Transactions on Neural Networks and Learning Systems, 2022
Constructions of Optimal Cyclic Locally Repairable Codes
B Chen, ST Xia, J Hao, FW Fu
IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017
A novel consistent random forest framework: Bernoulli random forests
Y Wang, ST Xia, Q Tang, J Wu, X Zhu
IEEE transactions on neural networks and learning systems 29 (8), 3510-3523, 2017
Back‐propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
X Xiao, Z Wang, Q Li, S Xia, Y Jiang
IET Information Security 11 (1), 8-15, 2017
Byte segment neural network for network traffic classification
R Li, X Xiao, S Ni, H Zheng, S Xia
2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 1-10, 2018
Rethinking the trigger of backdoor attack
Y Li, T Zhai, B Wu, Y Jiang, Z Li, S Xia
arXiv preprint arXiv:2004.04692, 2020
Some results on optimal locally repairable codes
J Hao, ST Xia, B Chen
2016 IEEE International Symposium on Information Theory (ISIT), 440-444, 2016
Bounds and constructions of locally repairable codes: Parity-check matrix approach
J Hao, ST Xia, KW Shum, B Chen, FW Fu, Y Yang
IEEE Transactions on Information Theory 66 (12), 7465-7474, 2020
Improving adversarial robustness via channel-wise activation suppressing
Y Bai, Y Zeng, Y Jiang, ST Xia, X Ma, Y Wang
arXiv preprint arXiv:2103.08307, 2021
Deterministic constructions of binary measurement matrices from finite geometry
ST Xia, XJ Liu, Y Jiang, HT Zheng
IEEE Transactions on Signal Processing 63 (4), 1017-1029, 2014
CNN–MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites
X Xiao, D Zhang, G Hu, Y Jiang, S Xia
Neural Networks 125, 303-312, 2020
Entropy-based bilateral filtering with a new range kernel
T Dai, W Lu, W Wang, J Wang, ST Xia
Signal Processing 137, 223-234, 2017
A survey of network update in SDN
D Li, S Wang, K Zhu, S Xia
Frontiers of computer science 11 (1), 4-12, 2017
The system can't perform the operation now. Try again later.
Articles 1–20