Alert button
Picture for Qiben Yan

Qiben Yan

Alert button

Michigan State University

Privacy-Preserving Diffusion Model Using Homomorphic Encryption

Add code
Bookmark button
Alert button
Mar 09, 2024
Yaojian Chen, Qiben Yan

Figure 1 for Privacy-Preserving Diffusion Model Using Homomorphic Encryption
Figure 2 for Privacy-Preserving Diffusion Model Using Homomorphic Encryption
Figure 3 for Privacy-Preserving Diffusion Model Using Homomorphic Encryption
Figure 4 for Privacy-Preserving Diffusion Model Using Homomorphic Encryption
Viaarxiv icon

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?

Add code
Bookmark button
Alert button
Dec 10, 2023
Yuanda Wang, Qiben Yan, Nikolay Ivanov, Xun Chen

Viaarxiv icon

Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems

Add code
Bookmark button
Alert button
Nov 20, 2023
Guangjing Wang, Ce Zhou, Yuanda Wang, Bocheng Chen, Hanqing Guo, Qiben Yan

Viaarxiv icon

MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems

Add code
Bookmark button
Alert button
Sep 13, 2023
Hanqing Guo, Xun Chen, Junfeng Guo, Li Xiao, Qiben Yan

Figure 1 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 2 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 3 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 4 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Viaarxiv icon

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection

Add code
Bookmark button
Alert button
Sep 13, 2023
Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao

Figure 1 for PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Figure 2 for PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Figure 3 for PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Figure 4 for PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Viaarxiv icon

Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots

Add code
Bookmark button
Alert button
Jul 14, 2023
Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan

Figure 1 for Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots
Figure 2 for Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots
Figure 3 for Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots
Figure 4 for Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots
Viaarxiv icon

VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation

Add code
Bookmark button
Alert button
May 09, 2023
Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan

Figure 1 for VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Figure 2 for VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Figure 3 for VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Figure 4 for VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Viaarxiv icon

A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT

Add code
Bookmark button
Alert button
Feb 18, 2023
Ce Zhou, Qian Li, Chen Li, Jun Yu, Yixin Liu, Guangjing Wang, Kai Zhang, Cheng Ji, Qiben Yan, Lifang He, Hao Peng, Jianxin Li, Jia Wu, Ziwei Liu, Pengtao Xie, Caiming Xiong, Jian Pei, Philip S. Yu, Lichao Sun

Figure 1 for A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT
Figure 2 for A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT
Figure 3 for A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT
Figure 4 for A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT
Viaarxiv icon

NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing

Add code
Bookmark button
Alert button
Jul 12, 2022
Hanqing Guo, Chenning Li, Lingkun Li, Zhichao Cao, Qiben Yan, Li Xiao

Figure 1 for NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing
Figure 2 for NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing
Figure 3 for NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing
Figure 4 for NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing
Viaarxiv icon

SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech

Add code
Bookmark button
Alert button
May 28, 2022
Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter

Figure 1 for SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
Figure 2 for SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
Figure 3 for SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
Figure 4 for SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
Viaarxiv icon