Picture for Tingsong Jiang

Tingsong Jiang

HeteroMorpheus: Universal Control Based on Morphological Heterogeneity Modeling

Add code
Aug 02, 2024
Viaarxiv icon

Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization

Add code
Jul 09, 2024
Viaarxiv icon

Universal Perturbation-based Secret Key-Controlled Data Hiding

Add code
Nov 03, 2023
Viaarxiv icon

Adversarial Examples in the Physical World: A Survey

Add code
Nov 01, 2023
Viaarxiv icon

Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations

Add code
Jul 16, 2023
Figure 1 for Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations
Figure 2 for Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations
Figure 3 for Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations
Figure 4 for Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations
Viaarxiv icon

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World

Add code
Jul 14, 2023
Viaarxiv icon

Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation

Add code
May 12, 2023
Viaarxiv icon

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications

Add code
Apr 20, 2023
Figure 1 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 2 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 3 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 4 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Viaarxiv icon

A Survey on Physical Adversarial Attack in Computer Vision

Add code
Sep 28, 2022
Figure 1 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 2 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 3 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 4 for A Survey on Physical Adversarial Attack in Computer Vision
Viaarxiv icon

A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design

Add code
Aug 15, 2022
Figure 1 for A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Figure 2 for A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Figure 3 for A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Figure 4 for A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design
Viaarxiv icon