Shasha Li
Shasha Li
Visual Search and AR, Amazon
Verified email at
Cited by
Cited by
Adversarial perturbations against real-time video classification systems
S Li, A Neupane, S Paul, C Song, SV Krishnamurthy, AKR Chowdhury, ...
NDSS 2019, 2018
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency
S Li, S Zhu, S Paul, A Roy-Chowdhury, C Song, S Krishnamurthy, ...
ECCV 2020, 2020
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations
S Li, A Aich, S Zhu, MS Asif, C Song, AK Roy-Chowdhury, ...
NeurIPS 2021, 2021
Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency
X Wang, S Li, M Liu, Y Wang, AK Roy-Chowdhury
ICCV 2021, 2021
Context-aware transfer attacks for object detection
Z Cai, X Xie, S Li, M Yin, C Song, SV Krishnamurthy, AK Roy-Chowdhury, ...
Proceedings of the AAAI Conference on Artificial Intelligence 36 (1), 149-157, 2022
ADC: Adversarial attacks against object Detection that evade Context consistency checks
M Yin, S Li, C Song, MS Asif, AK Roy-Chowdhury, SV Krishnamurthy
WCAC 2022, 2021
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
M Yin, S Li, Z Cai, C Song, MS Asif, AK Roy-Chowdhury, ...
ICCV 2021, 2021
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning
S Zhu, S Li, Z Wang, X Chen, Z Qian, SV Krishnamurthy, KS Chan, ...
CoNEXT 2020, 2020
Amazon Shop the Look: A visual search system for fashion and home
M Du, A Ramisa, AK KC, S Chanda, M Wang, N Rajesh, S Li, Y Hu, ...
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and …, 2022
A4: Evading Learning-based Adblockers
S Zhu, Z Wang, X Chen, S Li, U Iqbal, Z Qian, KS Chan, SV Krishnamurthy, ...
arXiv preprint arXiv:2001.10999, 2020
DeepTrack: Grouping RFID Tags Based on Spatio-temporal Proximity in Retail Spaces
S Li, M Arslan, A Khojastepour, SV Krishnamurthy, S Rangarajan
InfoCom 2020, 2020
Adaptive LPQ: An efficient descriptor for blurred face recognition
J Li, S Li, J Hu, W Deng
2015 11th IEEE International Conference and Workshops on Automatic Face and …, 2015
Leveraging local patch differences in multi-object scenes for generative adversarial attacks
A Aich, S Li, C Song, MS Asif, SV Krishnamurthy, AK Roy-Chowdhury
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2023
A priority-based dynamic web requests scheduling for web servers over content-centric networking
Y Tu, X Qiao, G Nan, J Chen, S Li
2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies …, 2015
Tracking RFID groups with spatio-temporal proximity
M Arslan, M Khojastepour, S Li, S Rangarajan
US Patent 11,580,317, 2023
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
S Li, K Khalil, R Panda, C Song, SV Krishnamurthy, AK Roy-Chowdhury, ...
ICCCN 2020, 2020
Eluding ML-based Adblockers With Actionable Adversarial Examples
S Zhu, Z Wang, X Chen, S Li, K Man, U Iqbal, Z Qian, KS Chan, ...
Annual Computer Security Applications Conference, 541-553, 2021
Face recognition based on random feature
S Li, W Deng
2015 Visual Communications and Image Processing (VCIP), 1-4, 2015
Simultaneous blurred face restoration and recognition
J Li, S Li, J Hu, W Deng
2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), 001-005, 2015
Noise-resistant local binary pattern based on random projection
S Li, Y Tu, W Deng, J Lu
2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), 806-810, 2015
The system can't perform the operation now. Try again later.
Articles 1–20