Picture for Shichang Sun

Shichang Sun

Compression-Resistant Backdoor Attack against Deep Neural Networks

Add code
Jan 03, 2022
Figure 1 for Compression-Resistant Backdoor Attack against Deep Neural Networks
Figure 2 for Compression-Resistant Backdoor Attack against Deep Neural Networks
Figure 3 for Compression-Resistant Backdoor Attack against Deep Neural Networks
Figure 4 for Compression-Resistant Backdoor Attack against Deep Neural Networks
Viaarxiv icon

Detect and remove watermark in deep neural networks via generative adversarial networks

Add code
Jun 15, 2021
Figure 1 for Detect and remove watermark in deep neural networks via generative adversarial networks
Figure 2 for Detect and remove watermark in deep neural networks via generative adversarial networks
Figure 3 for Detect and remove watermark in deep neural networks via generative adversarial networks
Figure 4 for Detect and remove watermark in deep neural networks via generative adversarial networks
Viaarxiv icon

Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images

Add code
Apr 19, 2021
Figure 1 for Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images
Figure 2 for Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images
Figure 3 for Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images
Figure 4 for Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images
Viaarxiv icon

Robust Backdoor Attacks against Deep Neural Networks in Real Physical World

Add code
Apr 15, 2021
Figure 1 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 2 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 3 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Figure 4 for Robust Backdoor Attacks against Deep Neural Networks in Real Physical World
Viaarxiv icon

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples

Add code
Mar 02, 2021
Figure 1 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 2 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 3 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Figure 4 for ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Viaarxiv icon

SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images

Add code
Nov 27, 2020
Figure 1 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 2 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 3 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Figure 4 for SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Viaarxiv icon