Alert button
Picture for Fu Song

Fu Song

Alert button

Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks

Add code
Bookmark button
Alert button
Jul 02, 2022
Jiaxiang Liu, Yunhan Xing, Xiaomu Shi, Fu Song, Zhiwu Xu, Zhong Ming

Figure 1 for Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks
Figure 2 for Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks
Figure 3 for Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks
Figure 4 for Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks
Viaarxiv icon

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition

Add code
Bookmark button
Alert button
Jun 07, 2022
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang

Figure 1 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 2 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 3 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 4 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Viaarxiv icon

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems

Add code
Bookmark button
Alert button
Jun 07, 2022
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Figure 1 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 2 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 3 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 4 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Viaarxiv icon

CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning

Add code
Bookmark button
Alert button
Oct 25, 2021
Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li

Figure 1 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 2 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 3 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Figure 4 for CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
Viaarxiv icon

SEC4SR: A Security Analysis Platform for Speaker Recognition

Add code
Bookmark button
Alert button
Sep 04, 2021
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Figure 1 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 2 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 3 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 4 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Viaarxiv icon

Attack as Defense: Characterizing Adversarial Examples using Robustness

Add code
Bookmark button
Alert button
Mar 13, 2021
Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun

Figure 1 for Attack as Defense: Characterizing Adversarial Examples using Robustness
Figure 2 for Attack as Defense: Characterizing Adversarial Examples using Robustness
Figure 3 for Attack as Defense: Characterizing Adversarial Examples using Robustness
Figure 4 for Attack as Defense: Characterizing Adversarial Examples using Robustness
Viaarxiv icon

BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks

Add code
Bookmark button
Alert button
Mar 12, 2021
Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Taolue Chen

Figure 1 for BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks
Figure 2 for BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks
Figure 3 for BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks
Figure 4 for BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks
Viaarxiv icon

Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels

Add code
Bookmark button
Alert button
Jul 27, 2020
Wenjie Wan, Zhaodi Zhang, Yiwei Zhu, Min Zhang, Fu Song

Figure 1 for Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels
Figure 2 for Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels
Figure 3 for Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels
Figure 4 for Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels
Viaarxiv icon

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Add code
Bookmark button
Alert button
Apr 15, 2020
Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu

Figure 1 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 2 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 3 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 4 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Viaarxiv icon