Picture for Qilong Zhang

Qilong Zhang

Practical Deep Dispersed Watermarking with Synchronization and Fusion

Add code
Oct 23, 2023
Figure 1 for Practical Deep Dispersed Watermarking with Synchronization and Fusion
Figure 2 for Practical Deep Dispersed Watermarking with Synchronization and Fusion
Figure 3 for Practical Deep Dispersed Watermarking with Synchronization and Fusion
Figure 4 for Practical Deep Dispersed Watermarking with Synchronization and Fusion
Viaarxiv icon

Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks

Add code
Oct 05, 2022
Figure 1 for Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Figure 2 for Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Figure 3 for Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Figure 4 for Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks
Viaarxiv icon

Frequency Domain Model Augmentation for Adversarial Attack

Add code
Jul 12, 2022
Figure 1 for Frequency Domain Model Augmentation for Adversarial Attack
Figure 2 for Frequency Domain Model Augmentation for Adversarial Attack
Figure 3 for Frequency Domain Model Augmentation for Adversarial Attack
Figure 4 for Frequency Domain Model Augmentation for Adversarial Attack
Viaarxiv icon

Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack

Add code
Mar 28, 2022
Figure 1 for Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Figure 2 for Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Figure 3 for Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Figure 4 for Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
Viaarxiv icon

Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation

Add code
Mar 09, 2022
Figure 1 for Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Figure 2 for Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Figure 3 for Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Figure 4 for Practical No-box Adversarial Attacks with Training-free Hybrid Image Transformation
Viaarxiv icon

Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains

Add code
Feb 10, 2022
Figure 1 for Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Figure 2 for Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Figure 3 for Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Figure 4 for Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Viaarxiv icon

Fast Gradient Non-sign Methods

Add code
Oct 25, 2021
Figure 1 for Fast Gradient Non-sign Methods
Figure 2 for Fast Gradient Non-sign Methods
Figure 3 for Fast Gradient Non-sign Methods
Figure 4 for Fast Gradient Non-sign Methods
Viaarxiv icon

Adversarial Attacks on ML Defense Models Competition

Add code
Oct 15, 2021
Figure 1 for Adversarial Attacks on ML Defense Models Competition
Figure 2 for Adversarial Attacks on ML Defense Models Competition
Figure 3 for Adversarial Attacks on ML Defense Models Competition
Figure 4 for Adversarial Attacks on ML Defense Models Competition
Viaarxiv icon

Feature Space Targeted Attacks by Statistic Alignment

Add code
May 25, 2021
Figure 1 for Feature Space Targeted Attacks by Statistic Alignment
Figure 2 for Feature Space Targeted Attacks by Statistic Alignment
Figure 3 for Feature Space Targeted Attacks by Statistic Alignment
Figure 4 for Feature Space Targeted Attacks by Statistic Alignment
Viaarxiv icon

Staircase Sign Method for Boosting Adversarial Attacks

Add code
Apr 20, 2021
Figure 1 for Staircase Sign Method for Boosting Adversarial Attacks
Figure 2 for Staircase Sign Method for Boosting Adversarial Attacks
Figure 3 for Staircase Sign Method for Boosting Adversarial Attacks
Figure 4 for Staircase Sign Method for Boosting Adversarial Attacks
Viaarxiv icon