Follow
Shu-Tao Xia
Title
Cited by
Cited by
Year
Second-order attention network for single image super-resolution
T Dai, J Cai, Y Zhang, ST Xia, L Zhang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
18792019
Adversarial weight perturbation helps robust generalization
D Wu, ST Xia, Y Wang
Advances in neural information processing systems 33, 2958-2969, 2020
7832020
Backdoor learning: A survey
Y Li, Y Jiang, Z Li, ST Xia
IEEE Transactions on Neural Networks and Learning Systems 35 (1), 5-22, 2022
6882022
Maintaining discrimination and fairness in class incremental learning
B Zhao, X Xiao, G Gan, B Zhang, ST Xia
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
5062020
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, S Erfani, S Xia, S Wijewickrema, ...
International Conference on Machine Learning, 3355-3364, 2018
4692018
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
arXiv preprint arXiv:2002.05990, 2020
3782020
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
Proceedings of the IEEE conference on computer vision and pattern …, 2018
3672018
Tokenpose: Learning keypoint tokens for human pose estimation
Y Li, S Zhang, Z Wang, S Yang, W Yang, ST Xia, E Zhou
Proceedings of the IEEE/CVF International conference on computer vision …, 2021
3182021
Rethinking the trigger of backdoor attack
Y Li, T Zhai, B Wu, Y Jiang, Z Li, S Xia
arXiv preprint arXiv:2004.04692, 2020
1732020
Johnson type bounds on constant dimension codes
ST Xia, FW Fu
Designs, Codes and Cryptography 50, 163-172, 2009
1502009
Improving adversarial robustness via channel-wise activation suppressing
Y Bai, Y Zeng, Y Jiang, ST Xia, X Ma, Y Wang
arXiv preprint arXiv:2103.08307, 2021
1362021
Simcc: A simple coordinate classification perspective for human pose estimation
Y Li, S Yang, P Liu, S Zhang, Y Wang, Z Wang, W Yang, ST Xia
European Conference on Computer Vision, 89-106, 2022
1332022
Mambair: A simple baseline for image restoration with state-space model
H Guo, J Li, T Dai, Z Ouyang, X Ren, ST Xia
European Conference on Computer Vision, 222-241, 2025
1242025
Backdoor attack against speaker verification
T Zhai, Y Li, Z Zhang, B Wu, Y Jiang, ST Xia
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
1182021
Byte segment neural network for network traffic classification
R Li, X Xiao, S Ni, H Zheng, S Xia
2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 1-10, 2018
1132018
Backdoor attack in the physical world
Y Li, T Zhai, Y Jiang, Z Li, ST Xia
arXiv preprint arXiv:2104.02361, 2021
1122021
CNN–MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites
X Xiao, D Zhang, G Hu, Y Jiang, S Xia
Neural Networks 125, 303-312, 2020
1052020
A novel consistent random forest framework: Bernoulli random forests
Y Wang, ST Xia, Q Tang, J Wu, X Zhu
IEEE transactions on neural networks and learning systems 29 (8), 3510-3523, 2017
1032017
Fakd: Feature-affinity based knowledge distillation for efficient image super-resolution
Z He, T Dai, J Lu, Y Jiang, ST Xia
2020 IEEE International Conference on Image Processing (ICIP), 518-522, 2020
972020
Constructions of Optimal Cyclic Locally Repairable Codes
B Chen, ST Xia, J Hao, FW Fu
IEEE Transactions on Information Theory 64 (4), 2499-2511, 2017
972017
The system can't perform the operation now. Try again later.
Articles 1–20