Picture for Chenan Wang

Chenan Wang

Detection and Recovery Against Deep Neural Network Fault Injection Attacks Based on Contrastive Learning

Add code
Jan 30, 2024
Viaarxiv icon

Dynamic Adversarial Attacks on Autonomous Driving Systems

Add code
Dec 10, 2023
Viaarxiv icon

Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?

Add code
Nov 30, 2023
Viaarxiv icon

Semantic Adversarial Attacks via Diffusion Models

Add code
Sep 14, 2023
Viaarxiv icon

Shifting Attention to Relevance: Towards the Uncertainty Estimation of Large Language Models

Add code
Jul 03, 2023
Viaarxiv icon

Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation

Add code
Jun 02, 2023
Figure 1 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 2 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 3 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 4 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Viaarxiv icon

Mixture of Robust Experts : A Flexible Defense Against Multiple Perturbations

Add code
Apr 21, 2021
Figure 1 for Mixture of Robust Experts : A Flexible Defense Against Multiple Perturbations
Figure 2 for Mixture of Robust Experts : A Flexible Defense Against Multiple Perturbations
Viaarxiv icon