Alert button
Picture for Sheng Wen

Sheng Wen

Alert button

The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices

Add code
Bookmark button
Alert button
Sep 26, 2022
Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang

Viaarxiv icon

StyleFool: Fooling Video Classification Systems via Style Transfer

Add code
Bookmark button
Alert button
Mar 30, 2022
Yuxin Cao, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen

Figure 1 for StyleFool: Fooling Video Classification Systems via Style Transfer
Figure 2 for StyleFool: Fooling Video Classification Systems via Style Transfer
Figure 3 for StyleFool: Fooling Video Classification Systems via Style Transfer
Figure 4 for StyleFool: Fooling Video Classification Systems via Style Transfer
Viaarxiv icon

DeFuzz: Deep Learning Guided Directed Fuzzing

Add code
Bookmark button
Alert button
Oct 23, 2020
Xiaogang Zhu, Shigang Liu, Xian Li, Sheng Wen, Jun Zhang, Camtepe Seyit, Yang Xiang

Figure 1 for DeFuzz: Deep Learning Guided Directed Fuzzing
Figure 2 for DeFuzz: Deep Learning Guided Directed Fuzzing
Figure 3 for DeFuzz: Deep Learning Guided Directed Fuzzing
Figure 4 for DeFuzz: Deep Learning Guided Directed Fuzzing
Viaarxiv icon

Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models

Add code
Bookmark button
Alert button
Oct 14, 2019
Derui, Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang

Figure 1 for Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
Figure 2 for Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
Figure 3 for Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
Figure 4 for Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
Viaarxiv icon

Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples

Add code
Bookmark button
Alert button
Feb 06, 2019
Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang

Figure 1 for Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples
Figure 2 for Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples
Figure 3 for Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples
Figure 4 for Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples
Viaarxiv icon

Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks

Add code
Bookmark button
Alert button
Jul 03, 2018
Derek Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang

Figure 1 for Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks
Figure 2 for Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks
Figure 3 for Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks
Figure 4 for Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks
Viaarxiv icon