Picture for Renyang Liu

Renyang Liu

CAAP: Capture-Aware Adversarial Patch Attacks on Palmprint Recognition Models

Add code
Apr 08, 2026
Viaarxiv icon

Hackers or Hallucinators? A Comprehensive Analysis of LLM-Based Automated Penetration Testing

Add code
Apr 07, 2026
Viaarxiv icon

REFORGE: Multi-modal Attacks Reveal Vulnerable Concept Unlearning in Image Generation Models

Add code
Mar 17, 2026
Viaarxiv icon

PWAVEP: Purifying Imperceptible Adversarial Perturbations in 3D Point Clouds via Spectral Graph Wavelets

Add code
Feb 03, 2026
Viaarxiv icon

SafeRedir: Prompt Embedding Redirection for Robust Unlearning in Image Generation Models

Add code
Jan 13, 2026
Viaarxiv icon

FactGuard: Event-Centric and Commonsense-Guided Fake News Detection

Add code
Nov 13, 2025
Figure 1 for FactGuard: Event-Centric and Commonsense-Guided Fake News Detection
Figure 2 for FactGuard: Event-Centric and Commonsense-Guided Fake News Detection
Figure 3 for FactGuard: Event-Centric and Commonsense-Guided Fake News Detection
Figure 4 for FactGuard: Event-Centric and Commonsense-Guided Fake News Detection
Viaarxiv icon

ANID: How Far Are We? Evaluating the Discrepancies Between AI-synthesized Images and Natural Images through Multimodal Guidance

Add code
Dec 23, 2024
Viaarxiv icon

STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario

Add code
Mar 30, 2024
Figure 1 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 2 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 3 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 4 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Viaarxiv icon

DTA: Distribution Transform-based Attack for Query-Limited Scenario

Add code
Dec 12, 2023
Viaarxiv icon

SSTA: Salient Spatially Transformed Attack

Add code
Dec 12, 2023
Figure 1 for SSTA: Salient Spatially Transformed Attack
Figure 2 for SSTA: Salient Spatially Transformed Attack
Figure 3 for SSTA: Salient Spatially Transformed Attack
Figure 4 for SSTA: Salient Spatially Transformed Attack
Viaarxiv icon