Picture for Di Tang

Di Tang

DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance

Add code
Mar 20, 2024
Figure 1 for DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance
Figure 2 for DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance
Figure 3 for DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance
Figure 4 for DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance
Viaarxiv icon

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

Add code
Jan 29, 2023
Figure 1 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 2 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 3 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 4 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Viaarxiv icon

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models

Add code
Dec 09, 2022
Figure 1 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 2 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 3 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 4 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Viaarxiv icon

Understanding Impacts of Task Similarity on Backdoor Attack and Detection

Add code
Oct 12, 2022
Figure 1 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 2 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 3 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 4 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Viaarxiv icon

Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models

Add code
Sep 14, 2022
Figure 1 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 2 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 3 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 4 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Viaarxiv icon

Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints

Add code
Aug 22, 2018
Figure 1 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 2 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 3 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 4 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Viaarxiv icon

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections

Add code
Aug 22, 2018
Figure 1 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 2 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 3 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 4 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Viaarxiv icon