Alert button
Picture for Qizhang Li

Qizhang Li

Alert button

Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly

Add code
Bookmark button
Alert button
Nov 02, 2023
Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen

Viaarxiv icon

DualAug: Exploiting Additional Heavy Augmentation with OOD Data Rejection

Add code
Bookmark button
Alert button
Oct 16, 2023
Zehao Wang, Yiwen Guo, Qizhang Li, Guanglei Yang, Wangmeng Zuo

Figure 1 for DualAug: Exploiting Additional Heavy Augmentation with OOD Data Rejection
Figure 2 for DualAug: Exploiting Additional Heavy Augmentation with OOD Data Rejection
Figure 3 for DualAug: Exploiting Additional Heavy Augmentation with OOD Data Rejection
Figure 4 for DualAug: Exploiting Additional Heavy Augmentation with OOD Data Rejection
Viaarxiv icon

Improving Transferability of Adversarial Examples via Bayesian Attacks

Add code
Bookmark button
Alert button
Jul 21, 2023
Qizhang Li, Yiwen Guo, Xiaochen Yang, Wangmeng Zuo, Hao Chen

Figure 1 for Improving Transferability of Adversarial Examples via Bayesian Attacks
Figure 2 for Improving Transferability of Adversarial Examples via Bayesian Attacks
Figure 3 for Improving Transferability of Adversarial Examples via Bayesian Attacks
Figure 4 for Improving Transferability of Adversarial Examples via Bayesian Attacks
Viaarxiv icon

Improving Adversarial Transferability via Intermediate-level Perturbation Decay

Add code
Bookmark button
Alert button
May 09, 2023
Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen

Figure 1 for Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Figure 2 for Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Figure 3 for Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Figure 4 for Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Viaarxiv icon

Improving Adversarial Transferability by Intermediate-level Perturbation Decay

Add code
Bookmark button
Alert button
Apr 26, 2023
Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen

Figure 1 for Improving Adversarial Transferability by Intermediate-level Perturbation Decay
Figure 2 for Improving Adversarial Transferability by Intermediate-level Perturbation Decay
Figure 3 for Improving Adversarial Transferability by Intermediate-level Perturbation Decay
Figure 4 for Improving Adversarial Transferability by Intermediate-level Perturbation Decay
Viaarxiv icon

Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples

Add code
Bookmark button
Alert button
Mar 02, 2023
Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen

Figure 1 for Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples
Figure 2 for Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples
Figure 3 for Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples
Figure 4 for Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples
Viaarxiv icon

Adversarial Contrastive Learning via Asymmetric InfoNCE

Add code
Bookmark button
Alert button
Jul 18, 2022
Qiying Yu, Jieming Lou, Xianyuan Zhan, Qizhang Li, Wangmeng Zuo, Yang Liu, Jingjing Liu

Figure 1 for Adversarial Contrastive Learning via Asymmetric InfoNCE
Figure 2 for Adversarial Contrastive Learning via Asymmetric InfoNCE
Figure 3 for Adversarial Contrastive Learning via Asymmetric InfoNCE
Figure 4 for Adversarial Contrastive Learning via Asymmetric InfoNCE
Viaarxiv icon

Collaborative Adversarial Training

Add code
Bookmark button
Alert button
May 23, 2022
Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen

Figure 1 for Collaborative Adversarial Training
Figure 2 for Collaborative Adversarial Training
Figure 3 for Collaborative Adversarial Training
Figure 4 for Collaborative Adversarial Training
Viaarxiv icon

An Intermediate-level Attack Framework on The Basis of Linear Regression

Add code
Bookmark button
Alert button
Mar 21, 2022
Yiwen Guo, Qizhang Li, Wangmeng Zuo, Hao Chen

Figure 1 for An Intermediate-level Attack Framework on The Basis of Linear Regression
Figure 2 for An Intermediate-level Attack Framework on The Basis of Linear Regression
Figure 3 for An Intermediate-level Attack Framework on The Basis of Linear Regression
Figure 4 for An Intermediate-level Attack Framework on The Basis of Linear Regression
Viaarxiv icon