Alert button
Picture for Shengzhi Zhang

Shengzhi Zhang

Alert button

MEA-Defender: A Robust Watermark against Model Extraction Attack

Add code
Bookmark button
Alert button
Jan 26, 2024
Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang

Viaarxiv icon

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

Add code
Bookmark button
Alert button
Sep 08, 2022
Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng

Figure 1 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 2 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 3 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 4 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Viaarxiv icon

DBIA: Data-free Backdoor Injection Attack against Transformer Networks

Add code
Bookmark button
Alert button
Nov 22, 2021
Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang

Figure 1 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 2 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 3 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 4 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Viaarxiv icon

HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks

Add code
Bookmark button
Alert button
Mar 25, 2021
Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li

Figure 1 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 2 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 3 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 4 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Viaarxiv icon

SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems

Add code
Bookmark button
Alert button
Mar 19, 2021
Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo

Figure 1 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 2 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 3 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 4 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Viaarxiv icon

Practical Adversarial Attack Against Object Detector

Add code
Bookmark button
Alert button
Dec 26, 2018
Yue Zhao, Hong Zhu, Qintao Shen, Ruigang Liang, Kai Chen, Shengzhi Zhang

Figure 1 for Practical Adversarial Attack Against Object Detector
Figure 2 for Practical Adversarial Attack Against Object Detector
Figure 3 for Practical Adversarial Attack Against Object Detector
Figure 4 for Practical Adversarial Attack Against Object Detector
Viaarxiv icon

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

Add code
Bookmark button
Alert button
Jul 02, 2018
Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter

Figure 1 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 2 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 3 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Figure 4 for CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Viaarxiv icon