Alert button
Picture for Baoyuan Wu

Baoyuan Wu

Alert button

Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection

Add code
Bookmark button
Alert button
Nov 19, 2023
Zhiyuan Yan, Yuhao Luo, Siwei Lyu, Qingshan Liu, Baoyuan Wu

Figure 1 for Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection
Figure 2 for Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection
Figure 3 for Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection
Figure 4 for Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection
Viaarxiv icon

VDC: Versatile Data Cleanser for Detecting Dirty Samples via Visual-Linguistic Inconsistency

Add code
Bookmark button
Alert button
Sep 28, 2023
Zihao Zhu, Mingda Zhang, Shaokui Wei, Bingzhe Wu, Baoyuan Wu

Viaarxiv icon

ToonTalker: Cross-Domain Face Reenactment

Add code
Bookmark button
Alert button
Aug 24, 2023
Yuan Gong, Yong Zhang, Xiaodong Cun, Fei Yin, Yanbo Fan, Xuan Wang, Baoyuan Wu, Yujiu Yang

Figure 1 for ToonTalker: Cross-Domain Face Reenactment
Figure 2 for ToonTalker: Cross-Domain Face Reenactment
Figure 3 for ToonTalker: Cross-Domain Face Reenactment
Figure 4 for ToonTalker: Cross-Domain Face Reenactment
Viaarxiv icon

Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples

Add code
Bookmark button
Alert button
Jul 20, 2023
Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu

Figure 1 for Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples
Figure 2 for Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples
Figure 3 for Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples
Figure 4 for Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples
Viaarxiv icon

Boosting Backdoor Attack with A Learnable Poisoning Sample Selection Strategy

Add code
Bookmark button
Alert button
Jul 14, 2023
Zihao Zhu, Mingda Zhang, Shaokui Wei, Li Shen, Yanbo Fan, Baoyuan Wu

Figure 1 for Boosting Backdoor Attack with A Learnable Poisoning Sample Selection Strategy
Figure 2 for Boosting Backdoor Attack with A Learnable Poisoning Sample Selection Strategy
Figure 3 for Boosting Backdoor Attack with A Learnable Poisoning Sample Selection Strategy
Figure 4 for Boosting Backdoor Attack with A Learnable Poisoning Sample Selection Strategy
Viaarxiv icon

NOFA: NeRF-based One-shot Facial Avatar Reconstruction

Add code
Bookmark button
Alert button
Jul 07, 2023
Wangbo Yu, Yanbo Fan, Yong Zhang, Xuan Wang, Fei Yin, Yunpeng Bai, Yan-Pei Cao, Ying Shan, Yang Wu, Zhongqian Sun, Baoyuan Wu

Figure 1 for NOFA: NeRF-based One-shot Facial Avatar Reconstruction
Figure 2 for NOFA: NeRF-based One-shot Facial Avatar Reconstruction
Figure 3 for NOFA: NeRF-based One-shot Facial Avatar Reconstruction
Figure 4 for NOFA: NeRF-based One-shot Facial Avatar Reconstruction
Viaarxiv icon

DeepfakeBench: A Comprehensive Benchmark of Deepfake Detection

Add code
Bookmark button
Alert button
Jul 04, 2023
Zhiyuan Yan, Yong Zhang, Xinhang Yuan, Siwei Lyu, Baoyuan Wu

Figure 1 for DeepfakeBench: A Comprehensive Benchmark of Deepfake Detection
Figure 2 for DeepfakeBench: A Comprehensive Benchmark of Deepfake Detection
Figure 3 for DeepfakeBench: A Comprehensive Benchmark of Deepfake Detection
Figure 4 for DeepfakeBench: A Comprehensive Benchmark of Deepfake Detection
Viaarxiv icon

Neural Polarizer: A Lightweight and Effective Backdoor Defense via Purifying Poisoned Features

Add code
Bookmark button
Alert button
Jun 29, 2023
Mingli Zhu, Shaokui Wei, Hongyuan Zha, Baoyuan Wu

Figure 1 for Neural Polarizer: A Lightweight and Effective Backdoor Defense via Purifying Poisoned Features
Figure 2 for Neural Polarizer: A Lightweight and Effective Backdoor Defense via Purifying Poisoned Features
Figure 3 for Neural Polarizer: A Lightweight and Effective Backdoor Defense via Purifying Poisoned Features
Figure 4 for Neural Polarizer: A Lightweight and Effective Backdoor Defense via Purifying Poisoned Features
Viaarxiv icon

Robust Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers

Add code
Bookmark button
Alert button
Jun 01, 2023
Ruotong Wang, Hongrui Chen, Zihao Zhu, Li Liu, Yong Zhang, Yanbo Fan, Baoyuan Wu

Figure 1 for Robust Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Figure 2 for Robust Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Figure 3 for Robust Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Figure 4 for Robust Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Viaarxiv icon

Learning to Learn from APIs: Black-Box Data-Free Meta-Learning

Add code
Bookmark button
Alert button
May 28, 2023
Zixuan Hu, Li Shen, Zhenyi Wang, Baoyuan Wu, Chun Yuan, Dacheng Tao

Figure 1 for Learning to Learn from APIs: Black-Box Data-Free Meta-Learning
Figure 2 for Learning to Learn from APIs: Black-Box Data-Free Meta-Learning
Figure 3 for Learning to Learn from APIs: Black-Box Data-Free Meta-Learning
Figure 4 for Learning to Learn from APIs: Black-Box Data-Free Meta-Learning
Viaarxiv icon