Picture for Anmin Fu

Anmin Fu

From Pixels to Trajectory: Universal Adversarial Example Detection via Temporal Imprints

Add code
Mar 06, 2025
Viaarxiv icon

Intellectual Property Protection for Deep Learning Model and Dataset Intelligence

Add code
Nov 07, 2024
Figure 1 for Intellectual Property Protection for Deep Learning Model and Dataset Intelligence
Figure 2 for Intellectual Property Protection for Deep Learning Model and Dataset Intelligence
Figure 3 for Intellectual Property Protection for Deep Learning Model and Dataset Intelligence
Figure 4 for Intellectual Property Protection for Deep Learning Model and Dataset Intelligence
Viaarxiv icon

TruVRF: Towards Triple-Granularity Verification on Machine Unlearning

Add code
Aug 12, 2024
Viaarxiv icon

Decaf: Data Distribution Decompose Attack against Federated Learning

Add code
May 24, 2024
Figure 1 for Decaf: Data Distribution Decompose Attack against Federated Learning
Figure 2 for Decaf: Data Distribution Decompose Attack against Federated Learning
Figure 3 for Decaf: Data Distribution Decompose Attack against Federated Learning
Figure 4 for Decaf: Data Distribution Decompose Attack against Federated Learning
Viaarxiv icon

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects

Add code
Mar 13, 2024
Viaarxiv icon

Vertical Federated Learning: Taxonomies, Threats, and Prospects

Add code
Feb 03, 2023
Figure 1 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 2 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 3 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 4 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Viaarxiv icon

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Sep 06, 2022
Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences

Add code
May 31, 2022
Figure 1 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 2 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 3 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 4 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Viaarxiv icon

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

Add code
Apr 13, 2022
Figure 1 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 2 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 3 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 4 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Viaarxiv icon

Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System

Add code
Apr 05, 2022
Figure 1 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 2 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 3 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 4 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Viaarxiv icon