Picture for Diqun Yan

Diqun Yan

Multi-Level Label Correction by Distilling Proximate Patterns for Semi-supervised Semantic Segmentation

Add code
Apr 10, 2024
Viaarxiv icon

Facial Data Minimization: Shallow Model as Your Privacy Filter

Add code
Oct 24, 2023
Viaarxiv icon

BadSQA: Stealthy Backdoor Attacks Using Presence Events as Triggers in Non-Intrusive Speech Quality Assessment

Add code
Sep 04, 2023
Viaarxiv icon

Evil Operation: Breaking Speaker Recognition with PaddingBack

Add code
Aug 08, 2023
Viaarxiv icon

Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition

Add code
Aug 04, 2023
Figure 1 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 2 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 3 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 4 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Viaarxiv icon

Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion

Add code
Jun 28, 2023
Viaarxiv icon

Semi-Supervised Semantic Segmentation with Cross Teacher Training

Add code
Sep 03, 2022
Figure 1 for Semi-Supervised Semantic Segmentation with Cross Teacher Training
Figure 2 for Semi-Supervised Semantic Segmentation with Cross Teacher Training
Figure 3 for Semi-Supervised Semantic Segmentation with Cross Teacher Training
Figure 4 for Semi-Supervised Semantic Segmentation with Cross Teacher Training
Viaarxiv icon

Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations

Add code
Jun 30, 2022
Figure 1 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 2 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 3 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 4 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Viaarxiv icon

Adversarial Privacy Protection on Speech Enhancement

Add code
Jun 16, 2022
Figure 1 for Adversarial Privacy Protection on Speech Enhancement
Figure 2 for Adversarial Privacy Protection on Speech Enhancement
Figure 3 for Adversarial Privacy Protection on Speech Enhancement
Figure 4 for Adversarial Privacy Protection on Speech Enhancement
Viaarxiv icon

Transferability of Adversarial Attacks on Synthetic Speech Detection

Add code
May 16, 2022
Figure 1 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 2 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 3 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 4 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Viaarxiv icon