Alert button
Picture for Liming Fang

Liming Fang

Alert button

SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection

Add code
Bookmark button
Alert button
Dec 30, 2023
Qiannan Wang, Changchun Yin, Liming Fang, Lu Zhou, Zhe Liu, Run Wang, Chenhao Lin

Viaarxiv icon

GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning

Add code
Bookmark button
Alert button
Oct 01, 2023
Qiannan Wang, Changchun Yin, Zhe Liu, Liming Fang, Run Wang, Chenhao Lin

Figure 1 for GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Figure 2 for GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Figure 3 for GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Figure 4 for GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning
Viaarxiv icon

SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning

Add code
Bookmark button
Alert button
Aug 16, 2023
Xiaobei Li, Changchun Yin, Liming Fang, Run Wang, Chenhao Lin

Figure 1 for SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning
Figure 2 for SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning
Figure 3 for SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning
Figure 4 for SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning
Viaarxiv icon

Hard Adversarial Example Mining for Improving Robust Fairness

Add code
Bookmark button
Alert button
Aug 03, 2023
Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang

Figure 1 for Hard Adversarial Example Mining for Improving Robust Fairness
Figure 2 for Hard Adversarial Example Mining for Improving Robust Fairness
Figure 3 for Hard Adversarial Example Mining for Improving Robust Fairness
Figure 4 for Hard Adversarial Example Mining for Improving Robust Fairness
Viaarxiv icon

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network

Add code
Bookmark button
Alert button
Jul 29, 2023
Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang

Figure 1 for What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Figure 2 for What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Figure 3 for What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Figure 4 for What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Viaarxiv icon

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic

Add code
Bookmark button
Alert button
Feb 27, 2023
Guodong Huang, Chuan Ma, Ming Ding, Yuwen Qian, Chunpeng Ge, Liming Fang, Zhe Liu

Figure 1 for Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Figure 2 for Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Figure 3 for Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Figure 4 for Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Viaarxiv icon

Cluster-guided Contrastive Graph Clustering Network

Add code
Bookmark button
Alert button
Jan 03, 2023
Xihong Yang, Yue Liu, Sihang Zhou, Siwei Wang, Wenxuan Tu, Qun Zheng, Xinwang Liu, Liming Fang, En Zhu

Figure 1 for Cluster-guided Contrastive Graph Clustering Network
Figure 2 for Cluster-guided Contrastive Graph Clustering Network
Figure 3 for Cluster-guided Contrastive Graph Clustering Network
Figure 4 for Cluster-guided Contrastive Graph Clustering Network
Viaarxiv icon

FedCom: A Byzantine-Robust Local Model Aggregation Rule Using Data Commitment for Federated Learning

Add code
Bookmark button
Alert button
Apr 16, 2021
Bo Zhao, Peng Sun, Liming Fang, Tao Wang, Keyu Jiang

Figure 1 for FedCom: A Byzantine-Robust Local Model Aggregation Rule Using Data Commitment for Federated Learning
Figure 2 for FedCom: A Byzantine-Robust Local Model Aggregation Rule Using Data Commitment for Federated Learning
Figure 3 for FedCom: A Byzantine-Robust Local Model Aggregation Rule Using Data Commitment for Federated Learning
Figure 4 for FedCom: A Byzantine-Robust Local Model Aggregation Rule Using Data Commitment for Federated Learning
Viaarxiv icon