Alert button
Picture for Shangbo Wu

Shangbo Wu

Alert button

Towards Transferable Adversarial Attacks with Centralized Perturbation

Add code
Bookmark button
Alert button
Dec 23, 2023
Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li

Viaarxiv icon

Unified High-binding Watermark for Unconditional Image Generation Models

Add code
Bookmark button
Alert button
Oct 14, 2023
Ruinan Ma, Yu-an Tan, Shangbo Wu, Tian Chen, Yajie Wang, Yuanzhang Li

Viaarxiv icon

Artificial Intelligence Security Competition (AISC)

Add code
Bookmark button
Alert button
Dec 07, 2022
Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, Yifei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang

Figure 1 for Artificial Intelligence Security Competition (AISC)
Figure 2 for Artificial Intelligence Security Competition (AISC)
Figure 3 for Artificial Intelligence Security Competition (AISC)
Figure 4 for Artificial Intelligence Security Competition (AISC)
Viaarxiv icon

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers

Add code
Bookmark button
Alert button
Jun 10, 2022
Nan Luo, Yuanzhang Li, Yajie Wang, Shangbo Wu, Yu-an Tan, Quanxin Zhang

Figure 1 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 2 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 3 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 4 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Viaarxiv icon

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches

Add code
Bookmark button
Alert button
Apr 27, 2022
Huipeng Zhou, Yu-an Tan, Yajie Wang, Haoran Lyu, Shangbo Wu, Yuanzhang Li

Figure 1 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 2 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 3 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 4 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Viaarxiv icon

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity

Add code
Bookmark button
Alert button
Jul 03, 2021
Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang

Figure 1 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 2 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 3 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 4 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Viaarxiv icon