Picture for Anmin Fu

Anmin Fu

From Pixels to Trajectory: Universal Adversarial Example Detection via Temporal Imprints

Add code
Mar 06, 2025
Viaarxiv icon

Intellectual Property Protection for Deep Learning Model and Dataset Intelligence

Add code
Nov 07, 2024
Viaarxiv icon

TruVRF: Towards Triple-Granularity Verification on Machine Unlearning

Add code
Aug 12, 2024
Viaarxiv icon

Decaf: Data Distribution Decompose Attack against Federated Learning

Add code
May 24, 2024
Viaarxiv icon

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects

Add code
Mar 13, 2024
Viaarxiv icon

Vertical Federated Learning: Taxonomies, Threats, and Prospects

Add code
Feb 03, 2023
Figure 1 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 2 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 3 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 4 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Viaarxiv icon

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Sep 06, 2022
Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences

Add code
May 31, 2022
Figure 1 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 2 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 3 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 4 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Viaarxiv icon

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

Add code
Apr 13, 2022
Figure 1 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 2 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 3 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 4 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Viaarxiv icon

Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System

Add code
Apr 05, 2022
Figure 1 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 2 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 3 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 4 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Viaarxiv icon