Picture for Shanqing Guo

Shanqing Guo

Jailbreaking Text-to-Image Models with LLM-Based Agents

Add code
Aug 01, 2024
Viaarxiv icon

AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection

Add code
Dec 14, 2023
Viaarxiv icon

RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks

Add code
Apr 17, 2023
Viaarxiv icon

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

Add code
Feb 22, 2022
Figure 1 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 2 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 3 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 4 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Viaarxiv icon

SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems

Add code
Mar 19, 2021
Figure 1 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 2 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 3 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 4 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Viaarxiv icon

DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography

Add code
Mar 13, 2019
Figure 1 for DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography
Figure 2 for DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography
Figure 3 for DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography
Figure 4 for DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography
Viaarxiv icon

Learning Symmetric and Asymmetric Steganography via Adversarial Training

Add code
Mar 13, 2019
Figure 1 for Learning Symmetric and Asymmetric Steganography via Adversarial Training
Figure 2 for Learning Symmetric and Asymmetric Steganography via Adversarial Training
Figure 3 for Learning Symmetric and Asymmetric Steganography via Adversarial Training
Figure 4 for Learning Symmetric and Asymmetric Steganography via Adversarial Training
Viaarxiv icon