Picture for Junhao Dong

Junhao Dong

Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training

Add code
Nov 05, 2024
Figure 1 for Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training
Figure 2 for Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training
Figure 3 for Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training
Figure 4 for Enhancing Adversarial Robustness via Uncertainty-Aware Distributional Adversarial Training
Viaarxiv icon

A Grey-box Attack against Latent Diffusion Model-based Image Editing by Posterior Collapse

Add code
Aug 20, 2024
Viaarxiv icon

FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs

Add code
Jul 02, 2024
Figure 1 for FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs
Figure 2 for FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs
Figure 3 for FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs
Figure 4 for FineCLIPER: Multi-modal Fine-grained CLIP for Dynamic Facial Expression Recognition with AdaptERs
Viaarxiv icon

Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability

Add code
Jan 13, 2024
Viaarxiv icon

Now and Future of Artificial Intelligence-based Signet Ring Cell Diagnosis: A Survey

Add code
Nov 16, 2023
Viaarxiv icon

Boundary-Refined Prototype Generation: A General End-to-End Paradigm for Semi-Supervised Semantic Segmentation

Add code
Jul 19, 2023
Viaarxiv icon

Releasing Inequality Phenomena in $L_{\infty}$-Adversarial Training via Input Gradient Distillation

Add code
May 17, 2023
Viaarxiv icon

Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications

Add code
Mar 24, 2023
Figure 1 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 2 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 3 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 4 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Viaarxiv icon

The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training

Add code
Nov 01, 2022
Figure 1 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 2 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 3 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 4 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Viaarxiv icon

Restricted Black-box Adversarial Attack Against DeepFake Face Swapping

Add code
Apr 26, 2022
Figure 1 for Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Figure 2 for Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Figure 3 for Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Figure 4 for Restricted Black-box Adversarial Attack Against DeepFake Face Swapping
Viaarxiv icon