Picture for Shengzhi Zhang

Shengzhi Zhang

MEA-Defender: A Robust Watermark against Model Extraction Attack

Add code
Jan 26, 2024
Viaarxiv icon

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

Add code
Sep 08, 2022
Figure 1 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 2 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 3 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 4 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Viaarxiv icon

DBIA: Data-free Backdoor Injection Attack against Transformer Networks

Add code
Nov 22, 2021
Figure 1 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 2 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 3 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 4 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Viaarxiv icon

HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks

Add code
Mar 25, 2021
Figure 1 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 2 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 3 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 4 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Viaarxiv icon

SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems

Add code
Mar 19, 2021
Figure 1 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 2 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 3 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 4 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Viaarxiv icon

Practical Adversarial Attack Against Object Detector

Add code
Dec 26, 2018
Figure 1 for Practical Adversarial Attack Against Object Detector
Figure 2 for Practical Adversarial Attack Against Object Detector
Figure 3 for Practical Adversarial Attack Against Object Detector
Figure 4 for Practical Adversarial Attack Against Object Detector
Viaarxiv icon

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

Add code
Jul 02, 2018
Figure 1 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 2 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 3 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 4 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Viaarxiv icon