Towards practical robustness analysis for DNNs based on PAC-model learning

R Li, P Yang, CC Huang, Y Sun, B Xue… - Proceedings of the 44th …, 2022 - dl.acm.org
To analyse local robustness properties of deep neural networks (DNNs), we present a practical
framework from a model learning perspective. Based on black-box model learning with …

Prodeep: a platform for robustness verification of deep neural networks

R Li, J Li, CC Huang, P Yang, X Huang… - Proceedings of the 28th …, 2020 - dl.acm.org
Deep neural networks (DNNs) have been applied in safety-critical domains such as self driving
cars, aircraft collision avoidance systems, malware detection, etc. In such scenarios, it is …

Improving neural network verification through spurious region guided refinement

P Yang, R Li, J Li, CC Huang, J Wang, J Sun… - … Conference on Tools …, 2021 - Springer
We propose a spurious region guided refinement approach for robustness verification of
deep neural networks. Our method starts with applying the DeepPoly abstract domain to …

Towards good practices in evaluating transfer adversarial attacks

Z Zhao, H Zhang, R Li, R Sicre, L Amsaleg… - arXiv preprint arXiv …, 2022 - arxiv.org
Transfer adversarial attacks raise critical security concerns in real-world, black-box
scenarios. However, the actual progress of this field is difficult to assess due to two common …

Enhancing robustness verification for deep neural networks via symbolic propagation

P Yang, J Li, J Liu, CC Huang, R Li, L Chen… - Formal Aspects of …, 2021 - Springer
Deep neural networks (DNNs) have been shown lack of robustness, as they are vulnerable
to small perturbations on the inputs. This has led to safety concerns on applying DNNs to …

Revisiting transferable adversarial image examples: Attack categorization, evaluation guidelines, and new insights

…, R Li, R Sicre, L Amsaleg, M Backes, Q Li… - arXiv preprint arXiv …, 2023 - arxiv.org
Transferable adversarial examples raise critical security concerns in real-world, black-box
attack scenarios. However, in this work, we identify two main problems in common evaluation …

Out-of-bounding-box triggers: A stealthy approach to cheat object detectors

T Lin, L Yu, G Jin, R Li, P Wu, L Zhang - European Conference on …, 2024 - Springer
In recent years, the study of adversarial robustness in object detection systems, particularly
those based on deep neural networks (DNNs), has become a pivotal area of research. …

Reach-avoid analysis for stochastic discrete-time systems

B Xue, R Li, N Zhan, M Fränzle - 2021 American Control …, 2021 - ieeexplore.ieee.org
Stochastic discrete-time systems, ie, discrete-time dynamic systems subject to stochastic
disturbances, are an essential modelling tool for many engineering systems, and reach-avoid …

3D digitization and its applications in cultural heritage

R Li, T Luo, H Zha - Euro-Mediterranean Conference, 2010 - Springer
3D digitizing technology has a variety of applications including reverse engineering, quality
control, virtual reality and digital heritage. Recently, great development in 3D digitizing …

Automated markerless registration of point clouds from TLS and structured light scanner for heritage documentation

…, W Zhang, N Mellado, P Grussenmeyer, R Li… - Journal of Cultural …, 2019 - Elsevier
Three-dimensional (3D) model is a major form of cultural heritage documentation. In most
cases, the properties of digital artefacts (eg readability, coverage) are affected by the …