Alert button
Picture for Wenyuan Xu

Wenyuan Xu

Alert button

Zhejiang University

SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models

Add code
Bookmark button
Alert button
Apr 19, 2024
Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu

Viaarxiv icon

SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models

Add code
Bookmark button
Alert button
Apr 10, 2024
Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu

Viaarxiv icon

CamPro: Camera-based Anti-Facial Recognition

Add code
Bookmark button
Alert button
Dec 30, 2023
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu

Viaarxiv icon

TPatch: A Triggered Physical Adversarial Patch

Add code
Bookmark button
Alert button
Dec 30, 2023
Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu

Viaarxiv icon

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time

Add code
Bookmark button
Alert button
Aug 03, 2023
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu

Figure 1 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 2 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 3 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 4 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Viaarxiv icon

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim

Add code
Bookmark button
Alert button
Aug 02, 2023
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu

Figure 1 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim
Figure 2 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim
Figure 3 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim
Figure 4 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim
Viaarxiv icon

Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound

Add code
Bookmark button
Alert button
Jun 28, 2023
Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu

Figure 1 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 2 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 3 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 4 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Viaarxiv icon

Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion

Add code
Bookmark button
Alert button
Feb 24, 2023
Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu

Figure 1 for Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion
Figure 2 for Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion
Figure 3 for Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion
Figure 4 for Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion
Viaarxiv icon

V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization

Add code
Bookmark button
Alert button
Oct 27, 2022
Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu

Figure 1 for V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Figure 2 for V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Figure 3 for V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Figure 4 for V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Viaarxiv icon

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing

Add code
Bookmark button
Alert button
May 08, 2022
Yan Long, Chen Yan, Shivan Prasad, Wenyuan Xu, Kevin Fu

Figure 1 for Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing
Figure 2 for Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing
Figure 3 for Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing
Figure 4 for Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing
Viaarxiv icon