Alert button
Picture for Renyang Liu

Renyang Liu

Alert button

STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario

Add code
Bookmark button
Alert button
Mar 30, 2024
Renyang Liu, Kwok-Yan Lam, Wei Zhou, Sixing Wu, Jun Zhao, Dongting Hu, Mingming Gong

Viaarxiv icon

SSTA: Salient Spatially Transformed Attack

Add code
Bookmark button
Alert button
Dec 12, 2023
Renyang Liu, Wei Zhou, Sixin Wu, Jun Zhao, Kwok-Yan Lam

Figure 1 for SSTA: Salient Spatially Transformed Attack
Figure 2 for SSTA: Salient Spatially Transformed Attack
Figure 3 for SSTA: Salient Spatially Transformed Attack
Figure 4 for SSTA: Salient Spatially Transformed Attack
Viaarxiv icon

DTA: Distribution Transform-based Attack for Query-Limited Scenario

Add code
Bookmark button
Alert button
Dec 12, 2023
Renyang Liu, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang, Ruxin Wang

Figure 1 for DTA: Distribution Transform-based Attack for Query-Limited Scenario
Figure 2 for DTA: Distribution Transform-based Attack for Query-Limited Scenario
Figure 3 for DTA: Distribution Transform-based Attack for Query-Limited Scenario
Figure 4 for DTA: Distribution Transform-based Attack for Query-Limited Scenario
Viaarxiv icon

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding

Add code
Bookmark button
Alert button
Nov 25, 2023
Bingbing Song, Derui Wang, Tianwei Zhang, Renyang Liu, Yu Lin, Wei Zhou

Figure 1 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 2 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 3 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 4 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Viaarxiv icon

Can LSH (Locality-Sensitive Hashing) Be Replaced by Neural Network?

Add code
Bookmark button
Alert button
Oct 15, 2023
Renyang Liu, Jun Zhao, Xing Chu, Yu Liang, Wei Zhou, Jing He

Viaarxiv icon

Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks

Add code
Bookmark button
Alert button
Oct 15, 2023
Renyang Liu, Wei Zhou, Jinhong Zhang, Xiaoyuan Liu, Peiyuan Si, Haoran Li

Viaarxiv icon

AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings

Add code
Bookmark button
Alert button
Oct 15, 2023
Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou

Viaarxiv icon

SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack

Add code
Bookmark button
Alert button
Oct 15, 2023
Renyang Liu, Jinhong Zhang, Kwok-Yan Lam, Jun Zhao, Wei Zhou

Viaarxiv icon

Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models

Add code
Bookmark button
Alert button
Oct 11, 2023
Renyang Liu, Wei Zhou, Tianwei Zhang, Kangjie Chen, Jun Zhao, Kwok-Yan Lam

Figure 1 for Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Figure 2 for Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Figure 3 for Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Figure 4 for Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
Viaarxiv icon