Picture for Huafeng Shi

Huafeng Shi

Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework

Add code
May 06, 2023
Figure 1 for Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Figure 2 for Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Figure 3 for Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Figure 4 for Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Viaarxiv icon

Artificial Intelligence Security Competition (AISC)

Add code
Dec 07, 2022
Figure 1 for Artificial Intelligence Security Competition (AISC)
Figure 2 for Artificial Intelligence Security Competition (AISC)
Figure 3 for Artificial Intelligence Security Competition (AISC)
Figure 4 for Artificial Intelligence Security Competition (AISC)
Viaarxiv icon

Adaptive Perturbation Generation for Multiple Backdoors Detection

Add code
Sep 13, 2022
Figure 1 for Adaptive Perturbation Generation for Multiple Backdoors Detection
Figure 2 for Adaptive Perturbation Generation for Multiple Backdoors Detection
Figure 3 for Adaptive Perturbation Generation for Multiple Backdoors Detection
Figure 4 for Adaptive Perturbation Generation for Multiple Backdoors Detection
Viaarxiv icon

Exploring Disentangled Content Information for Face Forgery Detection

Add code
Jul 19, 2022
Figure 1 for Exploring Disentangled Content Information for Face Forgery Detection
Figure 2 for Exploring Disentangled Content Information for Face Forgery Detection
Figure 3 for Exploring Disentangled Content Information for Face Forgery Detection
Figure 4 for Exploring Disentangled Content Information for Face Forgery Detection
Viaarxiv icon

Few-shot Forgery Detection via Guided Adversarial Interpolation

Add code
Apr 12, 2022
Figure 1 for Few-shot Forgery Detection via Guided Adversarial Interpolation
Figure 2 for Few-shot Forgery Detection via Guided Adversarial Interpolation
Figure 3 for Few-shot Forgery Detection via Guided Adversarial Interpolation
Figure 4 for Few-shot Forgery Detection via Guided Adversarial Interpolation
Viaarxiv icon