default search action
Tingsong Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j20]Chao Li, Tingsong Jiang, Handing Wang, Wen Yao, Donghua Wang:
Optimizing Latent Variables in Integrating Transfer and Query Based Attack Framework. IEEE Trans. Pattern Anal. Mach. Intell. 47(1): 161-171 (2025) - [j19]Junqi Wu, Wen Yao, Shuai Jia, Tingsong Jiang, Weien Zhou, Chao Ma, Xiaoqian Chen:
Gradient-based sparse voxel attacks on point cloud object detection. Pattern Recognit. 160: 111156 (2025) - 2024
- [j18]Guijian Tang, Wen Yao, Chao Li, Tingsong Jiang, Shaowu Yang:
Black-box adversarial patch attacks using differential evolution against aerial imagery object detectors. Eng. Appl. Artif. Intell. 137: 109141 (2024) - [j17]Paige Bright, Xinyu Fang, Barrett Heritage, Alex Iosevich, Tingsong Jiang, Hans Parshall, Maxwell Sun:
Generalized point configurations in Fqd. Finite Fields Their Appl. 99: 102472 (2024) - [j16]Guijian Tang, Wen Yao, Tingsong Jiang, Yong Zhao, Jialiang Sun:
Adversarial patch-based false positive creation attacks against aerial imagery object detectors. Neurocomputing 579: 127431 (2024) - [j15]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Multi-objective evolutionary search of variable-length composite semantic perturbations. Inf. Sci. 677: 120827 (2024) - [j14]Chao Li, Handing Wang, Wen Yao, Tingsong Jiang:
Adversarial attacks in computer vision: a survey. J. Membr. Comput. 6(2): 130-147 (2024) - [j13]Chengyin Hu, Weiwen Shi, Tingsong Jiang, Wen Yao, Ling Tian, Xiaoqian Chen, Jingzhi Zhou, Wen Li:
Adversarial infrared blocks: A multi-view black-box attack to thermal infrared detectors in physical world. Neural Networks 175: 106310 (2024) - [j12]Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen:
An invisible, robust copyright protection method for DNN-generated content. Neural Networks 177: 106391 (2024) - [j11]Chengyin Hu, Weiwen Shi, Wen Yao, Tingsong Jiang, Ling Tian, Xiaoqian Chen, Wen Li:
Adversarial Infrared Curves: An attack on infrared pedestrian detectors in the physical world. Neural Networks 178: 106459 (2024) - [j10]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Efficient search of comprehensively robust neural architectures via multi-fidelity evaluation. Pattern Recognit. 146: 110038 (2024) - [j9]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
AdvOps: Decoupling adversarial examples. Pattern Recognit. 149: 110252 (2024) - [j8]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Improving Transferability of Universal Adversarial Perturbation With Feature Disruption. IEEE Trans. Image Process. 33: 722-737 (2024) - [c14]Chao Li, Wen Yao, Handing Wang, Tingsong Jiang, Donghua Wang, Jialiang Sun:
QRPatch: A Deceptive Texture-Based Black-Box Adversarial Attacks with Genetic Algorithm. CEC 2024: 1-8 - [c13]Jiahuan Long, Tingsong Jiang, Wen Yao, Shuai Jia, Weijia Zhang, Weien Zhou, Chao Ma, Xiaoqian Chen:
PapMOT: Exploring Adversarial Patch Attack Against Multiple Object Tracking. ECCV (51) 2024: 128-144 - [c12]YiFan Hao, Yang Yang, Junru Song, Wei Peng, Weien Zhou, Tingsong Jiang, Wen Yao:
HeteroMorpheus: Universal Control Based on Morphological Heterogeneity Modeling. IJCNN 2024: 1-8 - [i16]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization. CoRR abs/2407.06688 (2024) - [i15]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaohu Zheng, Junqi Wu, Xiaoqian Chen:
Improving the Transferability of Adversarial Examples by Feature Augmentation. CoRR abs/2407.06714 (2024) - [i14]YiFan Hao, Yang Yang, Junru Song, Wei Peng, Weien Zhou, Tingsong Jiang, Wen Yao:
HeteroMorpheus: Universal Control Based on Morphological Heterogeneity Modeling. CoRR abs/2408.01230 (2024) - 2023
- [j7]Chao Li, Wen Yao, Handing Wang, Tingsong Jiang, Xiaoya Zhang:
Bayesian evolutionary optimization for crafting high-quality adversarial examples with limited query budget. Appl. Soft Comput. 142: 110370 (2023) - [j6]Guijian Tang, Tingsong Jiang, Weien Zhou, Chao Li, Wen Yao, Yong Zhao:
Adversarial patch attacks against aerial imagery object detectors. Neurocomputing 537: 128-140 (2023) - [j5]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
A multi-objective memetic algorithm for automatic adversarial attack optimization design. Neurocomputing 547: 126318 (2023) - [j4]Jialiang Sun, Wen Yao, Tingsong Jiang, Donghua Wang, Xiaoqian Chen:
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors. Neural Networks 163: 256-271 (2023) - [j3]Chao Li, Wen Yao, Handing Wang, Tingsong Jiang:
Adaptive momentum variance for attention-guided sparse adversarial attacks. Pattern Recognit. 133: 108979 (2023) - [j2]Guijian Tang, Wen Yao, Tingsong Jiang, Weien Zhou, Yang Yang, Donghua Wang:
Natural Weather-Style Black-Box Adversarial Attacks Against Optical Aerial Detectors. IEEE Trans. Geosci. Remote. Sens. 61: 1-11 (2023) - [c11]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World. ICCV 2023: 4432-4442 - [i13]Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen:
A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications. CoRR abs/2304.10679 (2023) - [i12]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation. CoRR abs/2305.07308 (2023) - [i11]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations. CoRR abs/2307.06548 (2023) - [i10]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World. CoRR abs/2307.07653 (2023) - [i9]Jiakai Wang, Donghua Wang, Jin Hu, Siyang Wu, Tingsong Jiang, Wen Yao, Aishan Liu, Xianglong Liu:
Adversarial Examples in the Physical World: A Survey. CoRR abs/2311.01473 (2023) - [i8]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Universal Perturbation-based Secret Key-Controlled Data Hiding. CoRR abs/2311.01696 (2023) - 2022
- [j1]Chao Li, Handing Wang, Jun Zhang, Wen Yao, Tingsong Jiang:
An Approximated Gradient Sign Method Using Differential Evolution for Black-Box Adversarial Attack. IEEE Trans. Evol. Comput. 26(5): 976-990 (2022) - [c10]Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Zhiqiang Gong, Xiaoya Zhang, Wen Yao, Xiaoqian Chen:
FCA: Learning a 3D Full-Coverage Vehicle Camouflage for Multi-View Physical Adversarial Attack. AAAI 2022: 2414-2422 - [c9]Xiaohu Zheng, Wen Yao, Zhiqiang Gong, Yunyang Zhang, Xiaoyu Zhao, Tingsong Jiang:
Deep Monte Carlo Quantile Regression for Quantifying Aleatoric Uncertainty in Physics-informed Temperature Field Reconstruction. IJCNN 2022: 1-8 - [i7]Xiaohu Zheng, Wen Yao, Zhiqiang Gong, Yunyang Zhang, Xiaoyu Zhao, Tingsong Jiang:
Deep Monte Carlo Quantile Regression for Quantifying Aleatoric Uncertainty in Physics-informed Temperature Field Reconstruction. CoRR abs/2202.06596 (2022) - [i6]Jialiang Sun, Tingsong Jiang, Chao Li, Weien Zhou, Xiaoya Zhang, Wen Yao, Xiaoqian Chen:
Searching for Robust Neural Architectures via Comprehensive and Reliable Evaluation. CoRR abs/2203.03128 (2022) - [i5]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design. CoRR abs/2208.06984 (2022) - [i4]Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen:
A Survey on Physical Adversarial Attack in Computer Vision. CoRR abs/2209.14262 (2022) - [i3]Jialiang Sun, Tingsong Jiang, Wen Yao, Donghua Wang, Xiaoqian Chen:
Differential Evolution based Dual Adversarial Camouflage: Fooling Human Eyes and Object Detectors. CoRR abs/2210.08870 (2022) - 2021
- [i2]Yufeng Xia, Jun Zhang, Zhiqiang Gong, Tingsong Jiang, Wen Yao:
Randomized ReLU Activation for Uncertainty Estimation of Deep Neural Networks. CoRR abs/2107.07197 (2021) - [i1]Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Xiaoya Zhang, Zhiqiang Gong, Wen Yao, Xiaoqian Chen:
FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack. CoRR abs/2109.07193 (2021)
2010 – 2019
- 2018
- [c8]Tingsong Jiang, Jing Liu, Chin-Yew Lin, Zhifang Sui:
Revisiting Distant Supervision for Relation Extraction. LREC 2018 - 2016
- [c7]Tingsong Jiang, Tianyu Liu, Tao Ge, Lei Sha, Baobao Chang, Sujian Li, Zhifang Sui:
Towards Time-Aware Knowledge Graph Completion. COLING 2016: 1715-1724 - [c6]Lei Sha, Sujian Li, Baobao Chang, Zhifang Sui, Tingsong Jiang:
Capturing Argument Relationship for Chinese Semantic Role Labeling. EMNLP 2016: 2011-2016 - [c5]Tingsong Jiang, Tianyu Liu, Tao Ge, Lei Sha, Sujian Li, Baobao Chang, Zhifang Sui:
Encoding Temporal Information for Time-Aware Link Prediction. EMNLP 2016: 2350-2354 - 2015
- [c4]Lei Sha, Sujian Li, Baobao Chang, Zhifang Sui, Tingsong Jiang:
Recognizing Textual Entailment Using Probabilistic Inference. EMNLP 2015: 1620-1625 - [c3]Zhen Wang, Tingsong Jiang, Baobao Chang, Zhifang Sui:
Chinese Semantic Role Labeling with Bidirectional Recurrent Neural Networks. EMNLP 2015: 1626-1631 - [c2]Chuncheng Xiang, Tingsong Jiang, Baobao Chang, Zhifang Sui:
ERSOM: A Structural Ontology Matching Approach Using Automatically Learned Entity Representation. EMNLP 2015: 2419-2429 - 2014
- [c1]Tingsong Jiang, Lei Sha, Zhifang Sui:
Event Schema Induction Based on Relational Co-occurrence over Multiple Documents. NLPCC 2014: 23-33
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint