Alert button
Picture for Tianyu Pang

Tianyu Pang

Alert button

A Roadmap for Big Model

Add code
Bookmark button
Alert button
Apr 02, 2022
Sha Yuan, Hanyu Zhao, Shuai Zhao, Jiahong Leng, Yangxiao Liang, Xiaozhi Wang, Jifan Yu, Xin Lv, Zhou Shao, Jiaao He, Yankai Lin, Xu Han, Zhenghao Liu, Ning Ding, Yongming Rao, Yizhao Gao, Liang Zhang, Ming Ding, Cong Fang, Yisen Wang, Mingsheng Long, Jing Zhang, Yinpeng Dong, Tianyu Pang, Peng Cui, Lingxiao Huang, Zheng Liang, Huawei Shen, Hui Zhang, Quanshi Zhang, Qingxiu Dong, Zhixing Tan, Mingxuan Wang, Shuo Wang, Long Zhou, Haoran Li, Junwei Bao, Yingwei Pan, Weinan Zhang, Zhou Yu, Rui Yan, Chence Shi, Minghao Xu, Zuobai Zhang, Guoqiang Wang, Xiang Pan, Mengjie Li, Xiaoyu Chu, Zijun Yao, Fangwei Zhu, Shulin Cao, Weicheng Xue, Zixuan Ma, Zhengyan Zhang, Shengding Hu, Yujia Qin, Chaojun Xiao, Zheni Zeng, Ganqu Cui, Weize Chen, Weilin Zhao, Yuan Yao, Peng Li, Wenzhao Zheng, Wenliang Zhao, Ziyi Wang, Borui Zhang, Nanyi Fei, Anwen Hu, Zenan Ling, Haoyang Li, Boxi Cao, Xianpei Han, Weidong Zhan, Baobao Chang, Hao Sun, Jiawen Deng, Chujie Zheng, Juanzi Li, Lei Hou, Xigang Cao, Jidong Zhai, Zhiyuan Liu, Maosong Sun, Jiwen Lu, Zhiwu Lu, Qin Jin, Ruihua Song, Ji-Rong Wen, Zhouchen Lin, Liwei Wang, Hang Su, Jun Zhu, Zhifang Sui, Jiajun Zhang, Yang Liu, Xiaodong He, Minlie Huang, Jian Tang, Jie Tang

Figure 1 for A Roadmap for Big Model
Figure 2 for A Roadmap for Big Model
Figure 3 for A Roadmap for Big Model
Figure 4 for A Roadmap for Big Model
Viaarxiv icon

Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

Add code
Bookmark button
Alert button
Mar 13, 2022
Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu

Figure 1 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 2 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 3 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 4 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Viaarxiv icon

Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition

Add code
Bookmark button
Alert button
Mar 10, 2022
Xiao Yang, Yinpeng Dong, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu

Figure 1 for Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Figure 2 for Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Figure 3 for Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Figure 4 for Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Viaarxiv icon

Robustness and Accuracy Could Be Reconcilable by (Proper) Definition

Add code
Bookmark button
Alert button
Feb 21, 2022
Tianyu Pang, Min Lin, Xiao Yang, Jun Zhu, Shuicheng Yan

Figure 1 for Robustness and Accuracy Could Be Reconcilable by (Proper) Definition
Figure 2 for Robustness and Accuracy Could Be Reconcilable by (Proper) Definition
Figure 3 for Robustness and Accuracy Could Be Reconcilable by (Proper) Definition
Figure 4 for Robustness and Accuracy Could Be Reconcilable by (Proper) Definition
Viaarxiv icon

Unrestricted Adversarial Attacks on ImageNet Competition

Add code
Bookmark button
Alert button
Oct 25, 2021
Yuefeng Chen, Xiaofeng Mao, Yuan He, Hui Xue, Chao Li, Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Fangcheng Liu, Chao Zhang, Hongyang Zhang, Yichi Zhang, Shilong Liu, Chang Liu, Wenzhao Xiang, Yajie Wang, Huipeng Zhou, Haoran Lyu, Yidan Xu, Zixuan Xu, Taoyu Zhu, Wenjun Li, Xianfeng Gao, Guoqiu Wang, Huanqian Yan, Ying Guo, Chaoning Zhang, Zheng Fang, Yang Wang, Bingyang Fu, Yunfei Zheng, Yekui Wang, Haorong Luo, Zhen Yang

Figure 1 for Unrestricted Adversarial Attacks on ImageNet Competition
Figure 2 for Unrestricted Adversarial Attacks on ImageNet Competition
Figure 3 for Unrestricted Adversarial Attacks on ImageNet Competition
Viaarxiv icon

Adversarial Attacks on ML Defense Models Competition

Add code
Bookmark button
Alert button
Oct 15, 2021
Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Jiayu Tang, Yuefeng Chen, XiaoFeng Mao, Yuan He, Hui Xue, Chao Li, Ye Liu, Qilong Zhang, Lianli Gao, Yunrui Yu, Xitong Gao, Zhe Zhao, Daquan Lin, Jiadong Lin, Chuanbiao Song, Zihao Wang, Zhennan Wu, Yang Guo, Jiequan Cui, Xiaogang Xu, Pengguang Chen

Figure 1 for Adversarial Attacks on ML Defense Models Competition
Figure 2 for Adversarial Attacks on ML Defense Models Competition
Figure 3 for Adversarial Attacks on ML Defense Models Competition
Figure 4 for Adversarial Attacks on ML Defense Models Competition
Viaarxiv icon

Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial Robustness

Add code
Bookmark button
Alert button
Oct 13, 2021
Xiao Yang, Yinpeng Dong, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu

Figure 1 for Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial Robustness
Figure 2 for Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial Robustness
Figure 3 for Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial Robustness
Figure 4 for Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial Robustness
Viaarxiv icon

Boosting Transferability of Targeted Adversarial Examples via Hierarchical Generative Networks

Add code
Bookmark button
Alert button
Jul 05, 2021
Xiao Yang, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu

Figure 1 for Boosting Transferability of Targeted Adversarial Examples via Hierarchical Generative Networks
Figure 2 for Boosting Transferability of Targeted Adversarial Examples via Hierarchical Generative Networks
Figure 3 for Boosting Transferability of Targeted Adversarial Examples via Hierarchical Generative Networks
Figure 4 for Boosting Transferability of Targeted Adversarial Examples via Hierarchical Generative Networks
Viaarxiv icon

Accumulative Poisoning Attacks on Real-time Data

Add code
Bookmark button
Alert button
Jun 18, 2021
Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu

Figure 1 for Accumulative Poisoning Attacks on Real-time Data
Figure 2 for Accumulative Poisoning Attacks on Real-time Data
Figure 3 for Accumulative Poisoning Attacks on Real-time Data
Figure 4 for Accumulative Poisoning Attacks on Real-time Data
Viaarxiv icon