Alert button
Picture for Chenhao Lin

Chenhao Lin

Alert button

SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection

Dec 30, 2023
Qiannan Wang, Changchun Yin, Liming Fang, Lu Zhou, Zhe Liu, Run Wang, Chenhao Lin

Viaarxiv icon

Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval

Dec 12, 2023
Qiwei Tian, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen

Viaarxiv icon

Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning

Oct 15, 2023
Yulong Yang, Chenhao Lin, Xiang Ji, Qiwei Tian, Qian Li, Hongshan Yang, Zhibo Wang, Chao Shen

Figure 1 for Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning
Figure 2 for Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning
Figure 3 for Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning
Figure 4 for Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning
Viaarxiv icon

Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection

Oct 07, 2023
Chenhao Lin, Fangbin Yi, Hang Wang, Qian Li, Deng Jingyi, Chao Shen

Figure 1 for Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection
Figure 2 for Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection
Figure 3 for Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection
Figure 4 for Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection
Viaarxiv icon

GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning

Oct 01, 2023
Qiannan Wang, Changchun Yin, Zhe Liu, Liming Fang, Run Wang, Chenhao Lin

Figure 1 for GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Figure 2 for GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Figure 3 for GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Figure 4 for GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Viaarxiv icon

SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning

Aug 16, 2023
Xiaobei Li, Changchun Yin, Liming Fang, Run Wang, Chenhao Lin

Figure 1 for SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning
Figure 2 for SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning
Figure 3 for SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning
Figure 4 for SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning
Viaarxiv icon

Hard Adversarial Example Mining for Improving Robust Fairness

Aug 03, 2023
Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang

Figure 1 for Hard Adversarial Example Mining for Improving Robust Fairness
Figure 2 for Hard Adversarial Example Mining for Improving Robust Fairness
Figure 3 for Hard Adversarial Example Mining for Improving Robust Fairness
Figure 4 for Hard Adversarial Example Mining for Improving Robust Fairness
Viaarxiv icon

End-to-end Face-swapping via Adaptive Latent Representation Learning

Mar 07, 2023
Chenhao Lin, Pengbin Hu, Chao Shen, Qian Li

Figure 1 for End-to-end Face-swapping via Adaptive Latent Representation Learning
Figure 2 for End-to-end Face-swapping via Adaptive Latent Representation Learning
Figure 3 for End-to-end Face-swapping via Adaptive Latent Representation Learning
Figure 4 for End-to-end Face-swapping via Adaptive Latent Representation Learning
Viaarxiv icon

Artificial Intelligence Security Competition (AISC)

Dec 07, 2022
Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, Yifei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang

Figure 1 for Artificial Intelligence Security Competition (AISC)
Figure 2 for Artificial Intelligence Security Competition (AISC)
Figure 3 for Artificial Intelligence Security Competition (AISC)
Figure 4 for Artificial Intelligence Security Competition (AISC)
Viaarxiv icon