Picture for Chun-Shien Lu

Chun-Shien Lu

Test-time Adversarial Defense with Opposite Adversarial Path and High Attack Time Cost

Add code
Oct 22, 2024
Figure 1 for Test-time Adversarial Defense with Opposite Adversarial Path and High Attack Time Cost
Figure 2 for Test-time Adversarial Defense with Opposite Adversarial Path and High Attack Time Cost
Figure 3 for Test-time Adversarial Defense with Opposite Adversarial Path and High Attack Time Cost
Figure 4 for Test-time Adversarial Defense with Opposite Adversarial Path and High Attack Time Cost
Viaarxiv icon

Adversarial Robustness Overestimation and Instability in TRADES

Add code
Oct 10, 2024
Figure 1 for Adversarial Robustness Overestimation and Instability in TRADES
Figure 2 for Adversarial Robustness Overestimation and Instability in TRADES
Figure 3 for Adversarial Robustness Overestimation and Instability in TRADES
Figure 4 for Adversarial Robustness Overestimation and Instability in TRADES
Viaarxiv icon

Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models

Add code
Oct 02, 2024
Figure 1 for Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models
Figure 2 for Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models
Figure 3 for Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models
Figure 4 for Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models
Viaarxiv icon

Exploring Robustness of Visual State Space model against Backdoor Attacks

Add code
Aug 22, 2024
Figure 1 for Exploring Robustness of Visual State Space model against Backdoor Attacks
Figure 2 for Exploring Robustness of Visual State Space model against Backdoor Attacks
Figure 3 for Exploring Robustness of Visual State Space model against Backdoor Attacks
Figure 4 for Exploring Robustness of Visual State Space model against Backdoor Attacks
Viaarxiv icon

LookupForensics: A Large-Scale Multi-Task Dataset for Multi-Phase Image-Based Fact Verification

Add code
Jul 26, 2024
Viaarxiv icon

Defending Against Repetitive-based Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off

Add code
Jul 14, 2024
Viaarxiv icon

Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network

Add code
Dec 13, 2023
Viaarxiv icon

Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics

Add code
Apr 07, 2021
Figure 1 for Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
Figure 2 for Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
Figure 3 for Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
Figure 4 for Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
Viaarxiv icon

Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation

Add code
Nov 28, 2020
Figure 1 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 2 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 3 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Figure 4 for Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation
Viaarxiv icon

QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing

Add code
Oct 22, 2020
Figure 1 for QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing
Figure 2 for QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing
Figure 3 for QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing
Figure 4 for QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing
Viaarxiv icon