Picture for Zhengyu Zhao

Zhengyu Zhao

Improving Adversarial Transferability on Vision Transformers via Forward Propagation Refinement

Add code
Mar 19, 2025
Viaarxiv icon

Revisiting Training-Inference Trigger Intensity in Backdoor Attacks

Add code
Mar 15, 2025
Viaarxiv icon

CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP

Add code
Mar 05, 2025
Figure 1 for CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP
Figure 2 for CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP
Figure 3 for CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP
Figure 4 for CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP
Viaarxiv icon

Improving Integrated Gradient-based Transferable Adversarial Examples by Refining the Integration Path

Add code
Dec 25, 2024
Viaarxiv icon

Nullu: Mitigating Object Hallucinations in Large Vision-Language Models via HalluSpace Projection

Add code
Dec 18, 2024
Viaarxiv icon

Can Targeted Clean-Label Poisoning Attacks Generalize?

Add code
Dec 05, 2024
Viaarxiv icon

Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations

Add code
Aug 27, 2024
Viaarxiv icon

Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer

Add code
Aug 21, 2024
Figure 1 for Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer
Figure 2 for Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer
Figure 3 for Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer
Figure 4 for Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer
Viaarxiv icon

A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication

Add code
Jul 15, 2024
Figure 1 for A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication
Figure 2 for A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication
Figure 3 for A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication
Figure 4 for A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication
Viaarxiv icon

ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving

Add code
Jun 09, 2024
Figure 1 for ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving
Figure 2 for ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving
Figure 3 for ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving
Figure 4 for ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving
Viaarxiv icon