Picture for Jian Weng

Jian Weng

Twin Trigger Generative Networks for Backdoor Attacks against Object Detection

Add code
Nov 23, 2024
Figure 1 for Twin Trigger Generative Networks for Backdoor Attacks against Object Detection
Figure 2 for Twin Trigger Generative Networks for Backdoor Attacks against Object Detection
Figure 3 for Twin Trigger Generative Networks for Backdoor Attacks against Object Detection
Figure 4 for Twin Trigger Generative Networks for Backdoor Attacks against Object Detection
Viaarxiv icon

Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification

Add code
Oct 06, 2024
Viaarxiv icon

Towards Robust Knowledge Tracing Models via k-Sparse Attention

Add code
Jul 24, 2024
Viaarxiv icon

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

Add code
Feb 23, 2024
Viaarxiv icon

Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems

Add code
Sep 20, 2023
Viaarxiv icon

A Survey of Secure Computation Using Trusted Execution Environments

Add code
Feb 23, 2023
Viaarxiv icon

Enhancing Deep Knowledge Tracing with Auxiliary Tasks

Add code
Feb 14, 2023
Viaarxiv icon

Learning Second Order Local Anomaly for General Face Forgery Detection

Add code
Sep 30, 2022
Figure 1 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 2 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 3 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 4 for Learning Second Order Local Anomaly for General Face Forgery Detection
Viaarxiv icon

Towards Target Sequential Rules

Add code
Jun 09, 2022
Figure 1 for Towards Target Sequential Rules
Figure 2 for Towards Target Sequential Rules
Figure 3 for Towards Target Sequential Rules
Figure 4 for Towards Target Sequential Rules
Viaarxiv icon

Deniable Steganography

Add code
May 25, 2022
Figure 1 for Deniable Steganography
Figure 2 for Deniable Steganography
Figure 3 for Deniable Steganography
Figure 4 for Deniable Steganography
Viaarxiv icon