Picture for Chengfang Fang

Chengfang Fang

AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification

Add code
Oct 09, 2023
Figure 1 for AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Figure 2 for AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Figure 3 for AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Figure 4 for AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification
Viaarxiv icon

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence

Add code
Dec 31, 2022
Figure 1 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 2 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 3 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 4 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Viaarxiv icon

A Survey on Reinforcement Learning Security with Application to Autonomous Driving

Add code
Dec 12, 2022
Figure 1 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 2 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 3 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 4 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Viaarxiv icon

Backdoor Pre-trained Models Can Transfer to All

Add code
Oct 30, 2021
Figure 1 for Backdoor Pre-trained Models Can Transfer to All
Figure 2 for Backdoor Pre-trained Models Can Transfer to All
Figure 3 for Backdoor Pre-trained Models Can Transfer to All
Figure 4 for Backdoor Pre-trained Models Can Transfer to All
Viaarxiv icon

Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack

Add code
Apr 13, 2021
Figure 1 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 2 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 3 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Figure 4 for Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack
Viaarxiv icon

A-FMI: Learning Attributions from Deep Networks via Feature Map Importance

Add code
Apr 12, 2021
Figure 1 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 2 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 3 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Figure 4 for A-FMI: Learning Attributions from Deep Networks via Feature Map Importance
Viaarxiv icon

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Add code
Oct 08, 2020
Figure 1 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 2 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 3 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Figure 4 for Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence
Viaarxiv icon

Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

Add code
Jul 08, 2010
Figure 1 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 2 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 3 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Figure 4 for Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Viaarxiv icon