Alert button
Picture for Chengfang Fang

Chengfang Fang

Alert button

AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification

Add code
Bookmark button
Alert button
Oct 09, 2023
Li Wang, Jiaqi Li, Yuhao Luo, Jiahao Zheng, Lei Wang, Hao Li, Ke Xu, Chengfang Fang, Jie Shi, Zhizheng Wu

Figure 1 for AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Figure 2 for AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Figure 3 for AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Figure 4 for AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Viaarxiv icon

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence

Add code
Bookmark button
Alert button
Dec 31, 2022
Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang

Figure 1 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 2 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 3 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 4 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Viaarxiv icon

A Survey on Reinforcement Learning Security with Application to Autonomous Driving

Add code
Bookmark button
Alert button
Dec 12, 2022
Ambra Demontis, Maura Pintor, Luca Demetrio, Kathrin Grosse, Hsiao-Ying Lin, Chengfang Fang, Battista Biggio, Fabio Roli

Figure 1 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 2 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 3 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 4 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Viaarxiv icon

Backdoor Pre-trained Models Can Transfer to All

Add code
Bookmark button
Alert button
Oct 30, 2021
Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang

Figure 1 for Backdoor Pre-trained Models Can Transfer to All
Figure 2 for Backdoor Pre-trained Models Can Transfer to All
Figure 3 for Backdoor Pre-trained Models Can Transfer to All
Figure 4 for Backdoor Pre-trained Models Can Transfer to All
Viaarxiv icon

Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack

Add code
Bookmark button
Alert button
Apr 13, 2021
Xinyi Zhang, Chengfang Fang, Jie Shi

Figure 1 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 2 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 3 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 4 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Viaarxiv icon

A-FMI: Learning Attributions from Deep Networks via Feature Map Importance

Add code
Bookmark button
Alert button
Apr 12, 2021
An Zhang, Xiang Wang, Chengfang Fang, Jie Shi, Tat-seng Chua, Zehua Chen

Figure 1 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 2 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 3 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 4 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Viaarxiv icon

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Add code
Bookmark button
Alert button
Oct 08, 2020
Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi

Figure 1 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 2 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 3 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 4 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Viaarxiv icon

Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

Add code
Bookmark button
Alert button
Jul 08, 2010
Chengfang Fang, Ee-Chien Chang

Figure 1 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 2 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 3 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 4 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Viaarxiv icon