Picture for Chengfang Fang

Chengfang Fang

AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification

Add code
Oct 09, 2023
Viaarxiv icon

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence

Add code
Dec 31, 2022
Viaarxiv icon

A Survey on Reinforcement Learning Security with Application to Autonomous Driving

Add code
Dec 12, 2022
Viaarxiv icon

Backdoor Pre-trained Models Can Transfer to All

Add code
Oct 30, 2021
Figure 1 for Backdoor Pre-trained Models Can Transfer to All
Figure 2 for Backdoor Pre-trained Models Can Transfer to All
Figure 3 for Backdoor Pre-trained Models Can Transfer to All
Figure 4 for Backdoor Pre-trained Models Can Transfer to All
Viaarxiv icon

Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack

Add code
Apr 13, 2021
Figure 1 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 2 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 3 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 4 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Viaarxiv icon

A-FMI: Learning Attributions from Deep Networks via Feature Map Importance

Add code
Apr 12, 2021
Figure 1 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 2 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 3 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 4 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Viaarxiv icon

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Add code
Oct 08, 2020
Figure 1 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 2 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 3 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 4 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Viaarxiv icon

Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

Add code
Jul 08, 2010
Figure 1 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 2 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 3 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 4 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Viaarxiv icon