Alert button
Picture for Rangding Wang

Rangding Wang

Alert button

Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition

Add code
Bookmark button
Alert button
Aug 04, 2023
JiaCheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian

Figure 1 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 2 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 3 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Figure 4 for Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
Viaarxiv icon

Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations

Add code
Bookmark button
Alert button
Jun 30, 2022
Mingyu Dong, Jiahao Chen, Diqun Yan, Jingxing Gao, Li Dong, Rangding Wang

Figure 1 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 2 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 3 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 4 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Viaarxiv icon

Adversarial Privacy Protection on Speech Enhancement

Add code
Bookmark button
Alert button
Jun 16, 2022
Mingyu Dong, Diqun Yan, Rangding Wang

Figure 1 for Adversarial Privacy Protection on Speech Enhancement
Figure 2 for Adversarial Privacy Protection on Speech Enhancement
Figure 3 for Adversarial Privacy Protection on Speech Enhancement
Figure 4 for Adversarial Privacy Protection on Speech Enhancement
Viaarxiv icon

Transferability of Adversarial Attacks on Synthetic Speech Detection

Add code
Bookmark button
Alert button
May 16, 2022
Jiacheng Deng, Shunyi Chen, Li Dong, Diqun Yan, Rangding Wang

Figure 1 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 2 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 3 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Figure 4 for Transferability of Adversarial Attacks on Synthetic Speech Detection
Viaarxiv icon

Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise

Add code
Bookmark button
Alert button
Sep 09, 2021
Mingyu Dong, Diqun Yan, Yongkang Gong, Rangding Wang

Figure 1 for Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Figure 2 for Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Figure 3 for Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Figure 4 for Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Viaarxiv icon