Alert button
Picture for Huafeng Shi

Huafeng Shi

Alert button

Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework

Add code
Bookmark button
Alert button
May 06, 2023
Ruijia Wu, Yuhang Wang, Huafeng Shi, Zhipeng Yu, Yichao Wu, Ding Liang

Figure 1 for Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Figure 2 for Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Figure 3 for Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Figure 4 for Towards Prompt-robust Face Privacy Protection via Adversarial Decoupling Augmentation Framework
Viaarxiv icon

Artificial Intelligence Security Competition (AISC)

Add code
Bookmark button
Alert button
Dec 07, 2022
Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, Yifei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang

Figure 1 for Artificial Intelligence Security Competition (AISC)
Figure 2 for Artificial Intelligence Security Competition (AISC)
Figure 3 for Artificial Intelligence Security Competition (AISC)
Figure 4 for Artificial Intelligence Security Competition (AISC)
Viaarxiv icon

Adaptive Perturbation Generation for Multiple Backdoors Detection

Add code
Bookmark button
Alert button
Sep 13, 2022
Yuhang Wang, Huafeng Shi, Rui Min, Ruijia Wu, Siyuan Liang, Yichao Wu, Ding Liang, Aishan Liu

Figure 1 for Adaptive Perturbation Generation for Multiple Backdoors Detection
Figure 2 for Adaptive Perturbation Generation for Multiple Backdoors Detection
Figure 3 for Adaptive Perturbation Generation for Multiple Backdoors Detection
Figure 4 for Adaptive Perturbation Generation for Multiple Backdoors Detection
Viaarxiv icon

Exploring Disentangled Content Information for Face Forgery Detection

Add code
Bookmark button
Alert button
Jul 19, 2022
Jiahao Liang, Huafeng Shi, Weihong Deng

Figure 1 for Exploring Disentangled Content Information for Face Forgery Detection
Figure 2 for Exploring Disentangled Content Information for Face Forgery Detection
Figure 3 for Exploring Disentangled Content Information for Face Forgery Detection
Figure 4 for Exploring Disentangled Content Information for Face Forgery Detection
Viaarxiv icon

Few-shot Forgery Detection via Guided Adversarial Interpolation

Add code
Bookmark button
Alert button
Apr 12, 2022
Haonan Qiu, Siyu Chen, Bei Gan, Kun Wang, Huafeng Shi, Jing Shao, Ziwei Liu

Figure 1 for Few-shot Forgery Detection via Guided Adversarial Interpolation
Figure 2 for Few-shot Forgery Detection via Guided Adversarial Interpolation
Figure 3 for Few-shot Forgery Detection via Guided Adversarial Interpolation
Figure 4 for Few-shot Forgery Detection via Guided Adversarial Interpolation
Viaarxiv icon