Xingjun Ma
Xingjun Ma
Lecturer@Deakin University, Honorary Fellow@University of Melbourne
Verified email at unimelb.edu.au - Homepage
Title
Cited by
Cited by
Year
Characterizing adversarial subspaces using local intrinsic dimensionality
X Ma, B Li, Y Wang, SM Erfani, S Wijewickrema, G Schoenebeck, D Song, ...
ICLR 2018, 2018
3402018
Dimensionality-driven learning with noisy labels
X Ma, Y Wang, ME Houle, S Zhou, SM Erfani, ST Xia, S Wijewickrema, ...
ICML 2018, 2018
1922018
Symmetric cross entropy for robust learning with noisy labels
Y Wang, X Ma, Z Chen, Y Luo, J Yi, J Bailey
ICCV 2019, 2019
1602019
Iterative learning with open-set noisy labels
Y Wang, W Liu, X Ma, J Bailey, H Zha, L Song, ST Xia
CVPR 2018, 2018
1522018
Improving adversarial robustness requires revisiting misclassified examples
Y Wang, D Zou, J Yi, J Bailey, X Ma, Q Gu
ICLR 2020, 2020
1132020
On the Convergence and Robustness of Adversarial Training
Y Wang, X Ma, J Bailey, J Yi, B Zhou, Q Gu
ICML 2019, 2019
1062019
Understanding adversarial attacks on deep learning based medical image analysis systems
X Ma, Y Niu, L Gu, Y Wang, Y Zhao, J Bailey, F Lu
Pattern Recognition 110, 107332, 2021
732021
Skip connections matter: On the transferability of adversarial examples generated with resnets
D Wu, Y Wang, ST Xia, J Bailey, X Ma
ICLR 2020, 2020
542020
Black-box adversarial attacks on video recognition models
L Jiang, X Ma, S Chen, J Bailey, YG Jiang
ACMMM 2019, 2019
532019
Towards fair and privacy-preserving federated deep models
L Lyu, J Yu, K Nandakumar, Y Li, X Ma, J Jin, H Yu, KS Ng
IEEE Transactions on Parallel and Distributed Systems 31 (11), 2524-2541, 2020
48*2020
Normalized loss functions for deep learning with noisy labels
X Ma, H Huang, Y Wang, S Romano, S Erfani, J Bailey
ICML 2020, 2020
472020
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles
R Duan, X Ma, Y Wang, J Bailey, AK Qin, Y Yang
CVPR 2020, 2020
302020
Reflection backdoor: A natural backdoor attack on deep neural networks
Y Liu, X Ma, J Bailey, F Lu
ECCV 2020, 2020
272020
Clean-Label Backdoor Attacks on Video Recognition Models
S Zhao, X Ma, X Zheng, J Bailey, J Chen, YG Jiang
CVPR 2020, 2020
202020
Design and evaluation of a virtual reality simulation module for training advanced temporal bone surgery
S Wijewickrema, B Copson, Y Zhou, X Ma, R Briggs, J Bailey, G Kennedy, ...
CBMS 2017, 7-12, 2017
192017
Providing automated real-time technical feedback for virtual reality based surgical training: is the simpler the better?
S Wijewickrema, X Ma, P Piromchai, R Briggs, J Bailey, G Kennedy, ...
AIED 2018, 2018
132018
Improving adversarial robustness via channel-wise activation suppressing
Y Bai, Y Zeng, Y Jiang, ST Xia, X Ma, Y Wang
ICLR 2021, 2021
122021
Adversarial generation of real-time feedback with neural networks for simulation-based training
X Ma, S Wijewickrema, S Zhou, Y Zhou, Z Mhammedi, S O'Leary, J Bailey
IJCAI 2017, 2017
12*2017
Unbiased multivariate correlation analysis
Y Wang, S Romano, V Nguyen, J Bailey, X Ma, ST Xia
AAAI 2017, 2017
112017
Finding influentials in Twitter: a temporal influence ranking model
X Ma, C Li, J Bailey, S Wijewickrema
AusDM 2016, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20