Picture for Di Tang

Di Tang

DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance

Add code
Mar 20, 2024
Viaarxiv icon

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

Add code
Jan 29, 2023
Figure 1 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 2 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 3 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 4 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Viaarxiv icon

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models

Add code
Dec 09, 2022
Viaarxiv icon

Understanding Impacts of Task Similarity on Backdoor Attack and Detection

Add code
Oct 12, 2022
Figure 1 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 2 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 3 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 4 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Viaarxiv icon

Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models

Add code
Sep 14, 2022
Figure 1 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 2 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 3 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 4 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Viaarxiv icon

Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints

Add code
Aug 22, 2018
Figure 1 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 2 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 3 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 4 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Viaarxiv icon

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections

Add code
Aug 22, 2018
Figure 1 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 2 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 3 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 4 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Viaarxiv icon