Picture for Can He

Can He

FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations

Add code
Mar 12, 2023
Viaarxiv icon

Robust Backdoor Attacks against Deep Neural Networks in Real Physical World

Add code
Apr 15, 2021
Figure 1 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 2 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 3 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 4 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Viaarxiv icon

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples

Add code
Mar 02, 2021
Figure 1 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 2 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 3 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 4 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Viaarxiv icon

3D Invisible Cloak

Add code
Nov 27, 2020
Figure 1 for 3D Invisible Cloak
Figure 2 for 3D Invisible Cloak
Figure 3 for 3D Invisible Cloak
Figure 4 for 3D Invisible Cloak
Viaarxiv icon

Robust and Natural Physical Adversarial Examples for Object Detectors

Add code
Nov 27, 2020
Viaarxiv icon

SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images

Add code
Nov 27, 2020
Figure 1 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 2 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 3 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 4 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Viaarxiv icon