Alert button
Picture for Tianqing Zhu

Tianqing Zhu

Alert button

Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness

Add code
Bookmark button
Alert button
Mar 23, 2023
Huajie Chen, Tianqing Zhu, Yuan Zhao, Bo Liu, Xin Yu, Wanlei Zhou

Figure 1 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 2 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 3 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 4 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Viaarxiv icon

New Challenges in Reinforcement Learning: A Survey of Security and Privacy

Add code
Bookmark button
Alert button
Dec 31, 2022
Yunjiao Lei, Dayong Ye, Sheng Shen, Yulei Sui, Tianqing Zhu, Wanlei Zhou

Viaarxiv icon

Momentum Gradient Descent Federated Learning with Local Differential Privacy

Add code
Bookmark button
Alert button
Sep 28, 2022
Mengde Han, Tianqing Zhu, Wanlei Zhou

Figure 1 for Momentum Gradient Descent Federated Learning with Local Differential Privacy
Figure 2 for Momentum Gradient Descent Federated Learning with Local Differential Privacy
Figure 3 for Momentum Gradient Descent Federated Learning with Local Differential Privacy
Figure 4 for Momentum Gradient Descent Federated Learning with Local Differential Privacy
Viaarxiv icon

BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis

Add code
Bookmark button
Alert button
Apr 21, 2022
Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo

Figure 1 for BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis
Figure 2 for BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis
Figure 3 for BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis
Figure 4 for BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis
Viaarxiv icon

Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack

Add code
Bookmark button
Alert button
Mar 22, 2022
Chi Liu, Huajie Chen, Tianqing Zhu, Jun Zhang, Wanlei Zhou

Figure 1 for Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Figure 2 for Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Figure 3 for Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Figure 4 for Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Viaarxiv icon

One Parameter Defense -- Defending against Data Inference Attacks via Differential Privacy

Add code
Bookmark button
Alert button
Mar 13, 2022
Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou

Viaarxiv icon

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It

Add code
Bookmark button
Alert button
Mar 13, 2022
Dayong Ye, Huiqiang Chen, Shuai Zhou, Tianqing Zhu, Wanlei Zhou, Shouling Ji

Figure 1 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 2 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 3 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 4 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Viaarxiv icon

Label-only Model Inversion Attack: The Attack that Requires the Least Information

Add code
Bookmark button
Alert button
Mar 13, 2022
Dayong Ye, Tianqing Zhu, Shuai Zhou, Bo Liu, Wanlei Zhou

Figure 1 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 2 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 3 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 4 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Viaarxiv icon

Semantic-Preserving Adversarial Text Attacks

Add code
Bookmark button
Alert button
Aug 23, 2021
Xinghao Yang, Weifeng Liu, James Bailey, Tianqing Zhu, Dacheng Tao, Wei Liu

Figure 1 for Semantic-Preserving Adversarial Text Attacks
Figure 2 for Semantic-Preserving Adversarial Text Attacks
Figure 3 for Semantic-Preserving Adversarial Text Attacks
Figure 4 for Semantic-Preserving Adversarial Text Attacks
Viaarxiv icon