Picture for Shangbo Wu

Shangbo Wu

Towards Transferable Adversarial Attacks with Centralized Perturbation

Add code
Dec 23, 2023
Figure 1 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 2 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 3 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 4 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Viaarxiv icon

Unified High-binding Watermark for Unconditional Image Generation Models

Add code
Oct 14, 2023
Viaarxiv icon

Artificial Intelligence Security Competition (AISC)

Add code
Dec 07, 2022
Figure 1 for Artificial Intelligence Security Competition (AISC)
Figure 2 for Artificial Intelligence Security Competition (AISC)
Figure 3 for Artificial Intelligence Security Competition (AISC)
Figure 4 for Artificial Intelligence Security Competition (AISC)
Viaarxiv icon

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers

Add code
Jun 10, 2022
Figure 1 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 2 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 3 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 4 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Viaarxiv icon

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches

Add code
Apr 27, 2022
Figure 1 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 2 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 3 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 4 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Viaarxiv icon

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity

Add code
Jul 03, 2021
Figure 1 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 2 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 3 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 4 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Viaarxiv icon