default search action
Yantao Lu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Bo Cheng, Yantao Lu, Yilan Li, Tao You, Peng Zhang:
Attentional Feature Erase: Towards task-wise transferable adversarial attack on cloud vision APIs. Displays 82: 102634 (2024) - [j8]Yantao Lu, Bo Jiang, Ning Liu, Yilan Li, Jinchao Chen, Ying Zhang, Zifu Wan:
CrossPrune: Cooperative pruning for camera-LiDAR fused perception models of autonomous driving. Knowl. Based Syst. 289: 111522 (2024) - [j7]Yantao Lu, Haining Ren, Weiheng Chai, Senem Velipasalar, Yilan Li:
Time-aware and task-transferable adversarial attack for perception of autonomous vehicles. Pattern Recognit. Lett. 178: 145-152 (2024) - [j6]Jinchao Chen, Tingyang Li, Ying Zhang, Tao You, Yantao Lu, Prayag Tiwari, Neeraj Kumar:
Global-and-Local Attention-Based Reinforcement Learning for Cooperative Behaviour Control of Multiple UAVs. IEEE Trans. Veh. Technol. 73(3): 4194-4206 (2024) - [j5]Yilan Li, Yantao Lu, Helei Cui, Senem Velipasalar:
Improving robustness and efficiency of edge computing models. Wirel. Networks 30(6): 4699-4711 (2024) - 2023
- [c11]Ying Zhang, Tingyi Zhao, Yingjie Zhang, Tao You, Yantao Lu, Jinchao Chen:
Work-in-Progress: Time-Aware Formation Control of Connected and Automated Vehicle Platoon Based on Weighted Graph Theory. RTSS 2023: 455-458 - 2022
- [j4]Qing Li, Yichen Wang, Tao You, Yantao Lu:
BioKnowPrompt: Incorporating imprecise knowledge into prompt-tuning verbalizer with biomedical text for relation extraction. Inf. Sci. 617: 346-358 (2022) - 2021
- [c10]Weiheng Chai, Yantao Lu, Senem Velipasalar:
Weighted Average Precision: Adversarial Example Detection for Visual Perception Of Autonomous Vehicles. ICIP 2021: 804-808 - [c9]Yantao Lu, Xueying Du, Bingkun Sun, Haining Ren, Senem Velipasalar:
Fabricate-Vanish: An Effective And Transferable Black-Box Adversarial Attack Incorporating Feature Distortion. ICIP 2021: 809-813 - [c8]Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu:
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. USENIX Security Symposium 2021: 1973-1988 - [i9]Yantao Lu, Xuetao Hao, Shiqi Sun, Weiheng Chai, Muchenxuan Tong, Senem Velipasalar:
RAANet: Range-Aware Attention Network for LiDAR-based 3D Object Detection with Auxiliary Density Level Estimation. CoRR abs/2111.09515 (2021) - 2020
- [j3]Natalie Sommer, Senem Velipasalar, Leanne M. Hirshfield, Yantao Lu, Burak Kakillioglu:
Simultaneous and Spatiotemporal Detection of Different Levels of Activity in Multidimensional Data. IEEE Access 8: 118205-118218 (2020) - [j2]Yu Zheng, Yantao Lu, Senem Velipasalar:
An Effective Adversarial Attack on Person Re-Identification in Video Surveillance via Dispersion Reduction. IEEE Access 8: 183891-183902 (2020) - [c7]Yantao Lu, Yunhan Jia, Jianyu Wang, Bai Li, Weiheng Chai, Lawrence Carin, Senem Velipasalar:
Enhancing Cross-Task Black-Box Transferability of Adversarial Examples With Dispersion Reduction. CVPR 2020: 937-946 - [c6]Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Hao Chan, Zhenyu Zhong, Tao Wei:
Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking. ICLR 2020 - [i8]Bai Li, Shiqi Wang, Yunhan Jia, Yantao Lu, Zhenyu Zhong, Lawrence Carin, Suman Jana:
Towards Practical Lottery Ticket Hypothesis for Adversarial Training. CoRR abs/2003.05733 (2020) - [i7]Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu:
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. CoRR abs/2006.12784 (2020)
2010 – 2019
- 2019
- [c5]Yantao Lu, Yilan Li, Senem Velipasalar:
Efficient Human Activity Classification from Egocentric Videos Incorporating Actor-Critic Reinforcement Learning. ICIP 2019: 564-568 - [c4]Yantao Lu, Senem Velipasalar:
Autonomous Choice of Deep Neural Network Parameters by a Modified Generative Adversarial Network. ICIP 2019: 3846-3850 - [i6]Yunhan Jia, Yantao Lu, Senem Velipasalar, Zhenyu Zhong, Tao Wei:
Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction. CoRR abs/1905.03333 (2019) - [i5]Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei:
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking. CoRR abs/1905.11026 (2019) - [i4]Yantao Lu, Senem Velipasalar:
Autonomous Human Activity Classification from Ego-vision Camera and Accelerometer Data. CoRR abs/1905.13533 (2019) - [i3]Yantao Lu, Yunhan Jia, Jianyu Wang, Bai Li, Weiheng Chai, Lawrence Carin, Senem Velipasalar:
Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction. CoRR abs/1911.11616 (2019) - 2018
- [c3]Yantao Lu, Senem Velipasalar:
Human Activity Classification Incorporating Egocentric Video and Inertial Measurement Unit Data. GlobalSIP 2018: 429-433 - [i2]Burak Kakillioglu, Yantao Lu, Senem Velipasalar:
Autonomously and Simultaneously Refining Deep Neural Network Parameters by Generative Adversarial Networks. CoRR abs/1805.09712 (2018) - [i1]Yantao Lu, Burak Kakillioglu, Senem Velipasalar:
Autonomously and Simultaneously Refining Deep Neural Network Parameters by a Bi-Generative Adversarial Network Aided Genetic Algorithm. CoRR abs/1809.10244 (2018) - 2017
- [c2]Yantao Lu, Senem Velipasalar:
Human activity classification from wearable devices with cameras. ACSSC 2017: 183-187 - 2016
- [c1]Yantao Lu, Senem Velipasalar:
Robust footstep counting and traveled distance calculation by mobile phones incorporating camera geometry. ICIP 2016: 464-468 - 2013
- [j1]Hui Cao, Wenquan Chen, Lixin Jia, Yanbin Zhang, Yantao Lu:
Cluster analysis based on attractor particle swarm optimization with boundary zoomed for working conditions classification of power plant pulverizing system. Neurocomputing 117: 54-63 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint