Alert button
Picture for Kejiang Chen

Kejiang Chen

Alert button

Data-Free Hard-Label Robustness Stealing Attack

Dec 12, 2023
Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu

Viaarxiv icon

Control Risk for Potential Misuse of Artificial Intelligence in Science

Dec 11, 2023
Jiyan He, Weitao Feng, Yaosen Min, Jingwei Yi, Kunsheng Tang, Shuai Li, Jie Zhang, Kejiang Chen, Wenbo Zhou, Xing Xie, Weiming Zhang, Nenghai Yu, Shuxin Zheng

Figure 1 for Control Risk for Potential Misuse of Artificial Intelligence in Science
Figure 2 for Control Risk for Potential Misuse of Artificial Intelligence in Science
Figure 3 for Control Risk for Potential Misuse of Artificial Intelligence in Science
Figure 4 for Control Risk for Potential Misuse of Artificial Intelligence in Science
Viaarxiv icon

GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance

May 21, 2023
Xiao Yu, Yuang Qi, Kejiang Chen, Guoqiang Chen, Xi Yang, Pengyuan Zhu, Weiming Zhang, Nenghai Yu

Figure 1 for GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance
Figure 2 for GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance
Figure 3 for GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance
Figure 4 for GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance
Viaarxiv icon

Watermarking Text Generated by Black-Box Language Models

May 14, 2023
Xi Yang, Kejiang Chen, Weiming Zhang, Chang Liu, Yuang Qi, Jie Zhang, Han Fang, Nenghai Yu

Figure 1 for Watermarking Text Generated by Black-Box Language Models
Figure 2 for Watermarking Text Generated by Black-Box Language Models
Figure 3 for Watermarking Text Generated by Black-Box Language Models
Figure 4 for Watermarking Text Generated by Black-Box Language Models
Viaarxiv icon

Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network

Feb 20, 2023
Xiaojian Yuan, Kejiang Chen, Jie Zhang, Weiming Zhang, Nenghai Yu, Yang Zhang

Figure 1 for Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network
Figure 2 for Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network
Figure 3 for Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network
Figure 4 for Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network
Viaarxiv icon

Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective

Oct 09, 2022
Yao Zhu, Yuefeng Chen, Xiaodan Li, Kejiang Chen, Yuan He, Xiang Tian, Bolun Zheng, Yaowu Chen, Qingming Huang

Figure 1 for Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Figure 2 for Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Figure 3 for Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Figure 4 for Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective
Viaarxiv icon

Invertible Mask Network for Face Privacy-Preserving

Apr 19, 2022
Yang Yang, Yiyang Huang, Ming Shi, Kejiang Chen, Weiming Zhang, Nenghai Yu

Figure 1 for Invertible Mask Network for Face Privacy-Preserving
Figure 2 for Invertible Mask Network for Face Privacy-Preserving
Figure 3 for Invertible Mask Network for Face Privacy-Preserving
Figure 4 for Invertible Mask Network for Face Privacy-Preserving
Viaarxiv icon

Invertible Image Dataset Protection

Dec 29, 2021
Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang

Figure 1 for Invertible Image Dataset Protection
Figure 2 for Invertible Image Dataset Protection
Figure 3 for Invertible Image Dataset Protection
Figure 4 for Invertible Image Dataset Protection
Viaarxiv icon

Tracing Text Provenance via Context-Aware Lexical Substitution

Dec 15, 2021
Xi Yang, Jie Zhang, Kejiang Chen, Weiming Zhang, Zehua Ma, Feng Wang, Nenghai Yu

Figure 1 for Tracing Text Provenance via Context-Aware Lexical Substitution
Figure 2 for Tracing Text Provenance via Context-Aware Lexical Substitution
Figure 3 for Tracing Text Provenance via Context-Aware Lexical Substitution
Figure 4 for Tracing Text Provenance via Context-Aware Lexical Substitution
Viaarxiv icon

Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition

Oct 19, 2021
Haozhe Chen, Weiming Zhang, Kunlin Liu, Kejiang Chen, Han Fang, Nenghai Yu

Figure 1 for Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Figure 2 for Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Figure 3 for Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Figure 4 for Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Viaarxiv icon