Picture for Shouling Ji

Shouling Ji

RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks

Add code
Apr 17, 2023
Viaarxiv icon

Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection

Add code
Mar 30, 2023
Figure 1 for Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection
Figure 2 for Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection
Figure 3 for Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection
Figure 4 for Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection
Viaarxiv icon

Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models

Add code
Mar 23, 2023
Figure 1 for Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models
Figure 2 for Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models
Figure 3 for Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models
Figure 4 for Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models
Viaarxiv icon

Edge Deep Learning Model Protection via Neuron Authorization

Add code
Mar 23, 2023
Viaarxiv icon

FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases

Add code
Feb 28, 2023
Viaarxiv icon

TextDefense: Adversarial Text Detection based on Word Importance Entropy

Add code
Feb 12, 2023
Figure 1 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 2 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 3 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 4 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Viaarxiv icon

All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning

Add code
Dec 01, 2022
Viaarxiv icon

Hijack Vertical Federated Learning Models with Adversarial Embedding

Add code
Dec 01, 2022
Figure 1 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 2 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 3 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 4 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Viaarxiv icon

Demystifying Self-supervised Trojan Attacks

Add code
Oct 13, 2022
Figure 1 for Demystifying Self-supervised Trojan Attacks
Figure 2 for Demystifying Self-supervised Trojan Attacks
Figure 3 for Demystifying Self-supervised Trojan Attacks
Figure 4 for Demystifying Self-supervised Trojan Attacks
Viaarxiv icon

Reasoning over Multi-view Knowledge Graphs

Add code
Sep 27, 2022
Figure 1 for Reasoning over Multi-view Knowledge Graphs
Figure 2 for Reasoning over Multi-view Knowledge Graphs
Figure 3 for Reasoning over Multi-view Knowledge Graphs
Figure 4 for Reasoning over Multi-view Knowledge Graphs
Viaarxiv icon