Picture for Yuxin Cao

Yuxin Cao

Mitigating Unauthorized Speech Synthesis for Voice Protection

Add code
Oct 28, 2024
Figure 1 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 2 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 3 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Figure 4 for Mitigating Unauthorized Speech Synthesis for Voice Protection
Viaarxiv icon

Query-Efficient Video Adversarial Attack with Stylized Logo

Add code
Aug 22, 2024
Viaarxiv icon

GRFormer: Grouped Residual Self-Attention for Lightweight Single Image Super-Resolution

Add code
Aug 14, 2024
Viaarxiv icon

Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems

Add code
Jul 11, 2024
Figure 1 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 2 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 3 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Figure 4 for Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems
Viaarxiv icon

Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing

Add code
Jun 04, 2024
Figure 1 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 2 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 3 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Figure 4 for Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Viaarxiv icon

Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer

Add code
May 15, 2024
Viaarxiv icon

Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security

Add code
Apr 08, 2024
Viaarxiv icon

LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model

Add code
Mar 27, 2024
Figure 1 for LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Figure 2 for LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Figure 3 for LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Figure 4 for LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model
Viaarxiv icon

3D Face Reconstruction Using A Spectral-Based Graph Convolution Encoder

Add code
Mar 08, 2024
Figure 1 for 3D Face Reconstruction Using A Spectral-Based Graph Convolution Encoder
Figure 2 for 3D Face Reconstruction Using A Spectral-Based Graph Convolution Encoder
Figure 3 for 3D Face Reconstruction Using A Spectral-Based Graph Convolution Encoder
Viaarxiv icon

LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer

Add code
Dec 15, 2023
Figure 1 for LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Figure 2 for LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Figure 3 for LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Figure 4 for LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Viaarxiv icon