Picture for Yuxin Cao

Yuxin Cao

E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis

Add code
Nov 10, 2025
Figure 1 for E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis
Figure 2 for E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis
Figure 3 for E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis
Figure 4 for E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis
Viaarxiv icon

ALMGuard: Safety Shortcuts and Where to Find Them as Guardrails for Audio-Language Models

Add code
Oct 30, 2025
Viaarxiv icon

Intriguing Frequency Interpretation of Adversarial Robustness for CNNs and ViTs

Add code
Jun 15, 2025
Viaarxiv icon

SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis

Add code
Apr 14, 2025
Figure 1 for SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis
Figure 2 for SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis
Figure 3 for SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis
Figure 4 for SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis
Viaarxiv icon

Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems

Add code
Apr 01, 2025
Viaarxiv icon

Mitigating Unauthorized Speech Synthesis for Voice Protection

Add code
Oct 28, 2024
Figure 1 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 2 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 3 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 4 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Viaarxiv icon

Query-Efficient Video Adversarial Attack with Stylized Logo

Add code
Aug 22, 2024
Viaarxiv icon

GRFormer: Grouped Residual Self-Attention for Lightweight Single Image Super-Resolution

Add code
Aug 14, 2024
Viaarxiv icon

Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems

Add code
Jul 11, 2024
Figure 1 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 2 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 3 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 4 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Viaarxiv icon

Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing

Add code
Jun 04, 2024
Figure 1 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 2 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 3 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 4 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Viaarxiv icon