Alert button
Picture for Mingyi Zhou

Mingyi Zhou

Alert button

Investigating White-Box Attacks for On-Device Models

Add code
Bookmark button
Alert button
Feb 26, 2024
Mingyi Zhou, Xiang Gao, Jing Wu, Kui Liu, Hailong Sun, Li Li

Viaarxiv icon

Defense against Privacy Leakage in Federated Learning

Add code
Bookmark button
Alert button
Sep 13, 2022
Jing Wu, Munawar Hayat, Mingyi Zhou, Mehrtash Harandi

Figure 1 for Defense against Privacy Leakage in Federated Learning
Figure 2 for Defense against Privacy Leakage in Federated Learning
Figure 3 for Defense against Privacy Leakage in Federated Learning
Figure 4 for Defense against Privacy Leakage in Federated Learning
Viaarxiv icon

Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions

Add code
Bookmark button
Alert button
Apr 22, 2021
Jing Wu, Mingyi Zhou, Ce Zhu, Yipeng Liu, Mehrtash Harandi, Li Li

Figure 1 for Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Figure 2 for Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Figure 3 for Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Figure 4 for Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Viaarxiv icon

Decision-based Universal Adversarial Attack

Add code
Bookmark button
Alert button
Sep 17, 2020
Jing Wu, Mingyi Zhou, Shuaicheng Liu, Yipeng Liu, Ce Zhu

Figure 1 for Decision-based Universal Adversarial Attack
Figure 2 for Decision-based Universal Adversarial Attack
Figure 3 for Decision-based Universal Adversarial Attack
Figure 4 for Decision-based Universal Adversarial Attack
Viaarxiv icon

ProbaNet: Proposal-balanced Network for Object Detection

Add code
Bookmark button
Alert button
May 27, 2020
Jing Wu, Xiang Zhang, Mingyi Zhou, Ce Zhu

Figure 1 for ProbaNet: Proposal-balanced Network for Object Detection
Figure 2 for ProbaNet: Proposal-balanced Network for Object Detection
Figure 3 for ProbaNet: Proposal-balanced Network for Object Detection
Figure 4 for ProbaNet: Proposal-balanced Network for Object Detection
Viaarxiv icon

DaST: Data-free Substitute Training for Adversarial Attacks

Add code
Bookmark button
Alert button
Mar 31, 2020
Mingyi Zhou, Jing Wu, Yipeng Liu, Shuaicheng Liu, Ce Zhu

Figure 1 for DaST: Data-free Substitute Training for Adversarial Attacks
Figure 2 for DaST: Data-free Substitute Training for Adversarial Attacks
Figure 3 for DaST: Data-free Substitute Training for Adversarial Attacks
Figure 4 for DaST: Data-free Substitute Training for Adversarial Attacks
Viaarxiv icon

Adversarial Imitation Attack

Add code
Bookmark button
Alert button
Mar 31, 2020
Mingyi Zhou, Jing Wu, Yipeng Liu, Xiaolin Huang, Shuaicheng Liu, Xiang Zhang, Ce Zhu

Figure 1 for Adversarial Imitation Attack
Figure 2 for Adversarial Imitation Attack
Figure 3 for Adversarial Imitation Attack
Figure 4 for Adversarial Imitation Attack
Viaarxiv icon