Picture for Derui Wang

Derui Wang

Minhui

Mitigating Unauthorized Speech Synthesis for Voice Protection

Add code
Oct 28, 2024
Figure 1 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 2 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 3 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 4 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Viaarxiv icon

Query-Efficient Video Adversarial Attack with Stylized Logo

Add code
Aug 22, 2024
Viaarxiv icon

Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems

Add code
Jul 11, 2024
Figure 1 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 2 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 3 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 4 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Viaarxiv icon

QUEEN: Query Unlearning against Model Extraction

Add code
Jul 01, 2024
Figure 1 for QUEEN: Query Unlearning against Model Extraction
Figure 2 for QUEEN: Query Unlearning against Model Extraction
Figure 3 for QUEEN: Query Unlearning against Model Extraction
Figure 4 for QUEEN: Query Unlearning against Model Extraction
Viaarxiv icon

Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

Add code
Jun 28, 2024
Figure 1 for Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Figure 2 for Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Figure 3 for Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Figure 4 for Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
Viaarxiv icon

Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing

Add code
Jun 04, 2024
Figure 1 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 2 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 3 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 4 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Viaarxiv icon

Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer

Add code
May 15, 2024
Viaarxiv icon

Provably Unlearnable Examples

Add code
May 06, 2024
Figure 1 for Provably Unlearnable Examples
Figure 2 for Provably Unlearnable Examples
Figure 3 for Provably Unlearnable Examples
Figure 4 for Provably Unlearnable Examples
Viaarxiv icon

LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model

Add code
Mar 27, 2024
Figure 1 for LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Figure 2 for LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Figure 3 for LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Figure 4 for LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Viaarxiv icon

Reinforcement Unlearning

Add code
Dec 26, 2023
Viaarxiv icon