Picture for Qianmu Li

Qianmu Li

Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability

Add code
Jul 02, 2024
Viaarxiv icon

Robust Model Aggregation for Heterogeneous Federated Learning: Analysis and Optimizations

Add code
May 11, 2024
Viaarxiv icon

Boost Adversarial Transferability by Uniform Scale and Mix Mask Method

Add code
Nov 18, 2023
Viaarxiv icon

Real-centric Consistency Learning for Deepfake Detection

Add code
May 15, 2022
Figure 1 for Real-centric Consistency Learning for Deepfake Detection
Figure 2 for Real-centric Consistency Learning for Deepfake Detection
Figure 3 for Real-centric Consistency Learning for Deepfake Detection
Figure 4 for Real-centric Consistency Learning for Deepfake Detection
Viaarxiv icon

Understanding CNNs from excitations

Add code
May 04, 2022
Figure 1 for Understanding CNNs from excitations
Figure 2 for Understanding CNNs from excitations
Figure 3 for Understanding CNNs from excitations
Viaarxiv icon

Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?

Add code
Sep 20, 2021
Figure 1 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 2 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 3 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 4 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Viaarxiv icon

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

Add code
Jun 30, 2020
Figure 1 for Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Figure 2 for Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Figure 3 for Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Figure 4 for Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Viaarxiv icon

SoK: Arms Race in Adversarial Malware Detection

Add code
Jun 15, 2020
Figure 1 for SoK: Arms Race in Adversarial Malware Detection
Figure 2 for SoK: Arms Race in Adversarial Malware Detection
Figure 3 for SoK: Arms Race in Adversarial Malware Detection
Figure 4 for SoK: Arms Race in Adversarial Malware Detection
Viaarxiv icon

Enhancing Deep Neural Networks Against Adversarial Malware Examples

Add code
Apr 15, 2020
Figure 1 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 2 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 3 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 4 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Viaarxiv icon

An Overview of Two Age Synthesis and Estimation Techniques

Add code
Jan 26, 2020
Figure 1 for An Overview of Two Age Synthesis and Estimation Techniques
Viaarxiv icon