Picture for Renyang Liu

Renyang Liu

ANID: How Far Are We? Evaluating the Discrepancies Between AI-synthesized Images and Natural Images through Multimodal Guidance

Add code
Dec 23, 2024
Viaarxiv icon

STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario

Add code
Mar 30, 2024
Figure 1 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 2 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 3 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 4 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Viaarxiv icon

DTA: Distribution Transform-based Attack for Query-Limited Scenario

Add code
Dec 12, 2023
Viaarxiv icon

SSTA: Salient Spatially Transformed Attack

Add code
Dec 12, 2023
Viaarxiv icon

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding

Add code
Nov 25, 2023
Viaarxiv icon

Can LSH Be Replaced by Neural Network?

Add code
Oct 15, 2023
Viaarxiv icon

SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack

Add code
Oct 15, 2023
Viaarxiv icon

AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings

Add code
Oct 15, 2023
Viaarxiv icon

Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks

Add code
Oct 15, 2023
Viaarxiv icon

Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models

Add code
Oct 11, 2023
Figure 1 for Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Figure 2 for Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Figure 3 for Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Figure 4 for Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Viaarxiv icon