Picture for Jiqiang Liu

Jiqiang Liu

Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning

Add code
Jun 10, 2024
Viaarxiv icon

CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications

Add code
Jan 20, 2024
Figure 1 for CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Figure 2 for CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Figure 3 for CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Figure 4 for CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Viaarxiv icon

TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph

Add code
Apr 06, 2023
Viaarxiv icon

DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks

Add code
Oct 14, 2021
Figure 1 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 2 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 3 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 4 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Viaarxiv icon

AppQ: Warm-starting App Recommendation Based on View Graphs

Add code
Sep 08, 2021
Figure 1 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 2 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 3 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 4 for AppQ: Warm-starting App Recommendation Based on View Graphs
Viaarxiv icon

IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks

Add code
Feb 03, 2021
Figure 1 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 2 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 3 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 4 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Viaarxiv icon

Generalizing Adversarial Examples by AdaBelief Optimizer

Add code
Jan 25, 2021
Figure 1 for Generalizing Adversarial Examples by AdaBelief Optimizer
Figure 2 for Generalizing Adversarial Examples by AdaBelief Optimizer
Viaarxiv icon

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack

Add code
May 09, 2019
Figure 1 for Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack
Figure 2 for Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack
Figure 3 for Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack
Figure 4 for Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack
Viaarxiv icon

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding

Add code
Jul 18, 2018
Figure 1 for Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Figure 2 for Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Figure 3 for Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Figure 4 for Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Viaarxiv icon