Alert button
Picture for Jiqiang Liu

Jiqiang Liu

Alert button

CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications

Add code
Bookmark button
Alert button
Jan 20, 2024
Hangsheng Zhang, Jiqiang Liu, Jinsong Dong

Viaarxiv icon

TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph

Add code
Bookmark button
Alert button
Apr 06, 2023
Nan Wang, Xuezhi Wen, Dalin Zhang, Xibin Zhao, Jiahui Ma, Mengxia Luo, Sen Nie, Shi Wu, Jiqiang Liu

Figure 1 for TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph
Figure 2 for TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph
Figure 3 for TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph
Figure 4 for TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph
Viaarxiv icon

DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks

Add code
Bookmark button
Alert button
Oct 14, 2021
Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez

Figure 1 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 2 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 3 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 4 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Viaarxiv icon

AppQ: Warm-starting App Recommendation Based on View Graphs

Add code
Bookmark button
Alert button
Sep 08, 2021
Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang

Figure 1 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 2 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 3 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 4 for AppQ: Warm-starting App Recommendation Based on View Graphs
Viaarxiv icon

IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks

Add code
Bookmark button
Alert button
Feb 03, 2021
Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić

Figure 1 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 2 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 3 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 4 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Viaarxiv icon

Generalizing Adversarial Examples by AdaBelief Optimizer

Add code
Bookmark button
Alert button
Jan 25, 2021
Yixiang Wang, Jiqiang Liu, Xiaolin Chang

Figure 1 for Generalizing Adversarial Examples by AdaBelief Optimizer
Figure 2 for Generalizing Adversarial Examples by AdaBelief Optimizer
Viaarxiv icon

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack

Add code
Bookmark button
Alert button
May 09, 2019
Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li

Figure 1 for Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack
Figure 2 for Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack
Figure 3 for Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack
Figure 4 for Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack
Viaarxiv icon

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding

Add code
Bookmark button
Alert button
Jul 18, 2018
Tong Chen, Wenjia Niu, Yingxiao Xiang, Xiaoxuan Bai, Jiqiang Liu, Zhen Han, Gang Li

Figure 1 for Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Figure 2 for Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Figure 3 for Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Figure 4 for Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding
Viaarxiv icon