Alert button
Picture for Xiaosen Wang

Xiaosen Wang

Alert button

Improving the Transferability of Adversarial Samples by Path-Augmented Method

Add code
Bookmark button
Alert button
Mar 28, 2023
Jianping Zhang, Jen-tse Huang, Wenxuan Wang, Yichen Li, Weibin Wu, Xiaosen Wang, Yuxin Su, Michael R. Lyu

Figure 1 for Improving the Transferability of Adversarial Samples by Path-Augmented Method
Figure 2 for Improving the Transferability of Adversarial Samples by Path-Augmented Method
Figure 3 for Improving the Transferability of Adversarial Samples by Path-Augmented Method
Figure 4 for Improving the Transferability of Adversarial Samples by Path-Augmented Method
Viaarxiv icon

Improving Adversarial Transferability with Scheduled Step Size and Dual Example

Add code
Bookmark button
Alert button
Jan 30, 2023
Zeliang Zhang, Peihan Liu, Xiaosen Wang, Chenliang Xu

Figure 1 for Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Figure 2 for Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Figure 3 for Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Figure 4 for Improving Adversarial Transferability with Scheduled Step Size and Dual Example
Viaarxiv icon

Robust Textual Embedding against Word-level Adversarial Attacks

Add code
Bookmark button
Alert button
Feb 28, 2022
Yichen Yang, Xiaosen Wang, Kun He

Figure 1 for Robust Textual Embedding against Word-level Adversarial Attacks
Figure 2 for Robust Textual Embedding against Word-level Adversarial Attacks
Figure 3 for Robust Textual Embedding against Word-level Adversarial Attacks
Figure 4 for Robust Textual Embedding against Word-level Adversarial Attacks
Viaarxiv icon

Learning-based Hybrid Local Search for the Hard-label Textual Attack

Add code
Bookmark button
Alert button
Jan 20, 2022
Zhen Yu, Xiaosen Wang, Wanxiang Che, Kun He

Figure 1 for Learning-based Hybrid Local Search for the Hard-label Textual Attack
Figure 2 for Learning-based Hybrid Local Search for the Hard-label Textual Attack
Figure 3 for Learning-based Hybrid Local Search for the Hard-label Textual Attack
Figure 4 for Learning-based Hybrid Local Search for the Hard-label Textual Attack
Viaarxiv icon

Triangle Attack: A Query-efficient Decision-based Adversarial Attack

Add code
Bookmark button
Alert button
Dec 13, 2021
Xiaosen Wang, Zeliang Zhang, Kangheng Tong, Dihong Gong, Kun He, Zhifeng Li, Wei Liu

Figure 1 for Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Figure 2 for Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Figure 3 for Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Figure 4 for Triangle Attack: A Query-efficient Decision-based Adversarial Attack
Viaarxiv icon

Randomized Substitution and Vote for Textual Adversarial Example Detection

Add code
Bookmark button
Alert button
Sep 13, 2021
Xiaosen Wang, Yifeng Xiong, Kun He

Figure 1 for Randomized Substitution and Vote for Textual Adversarial Example Detection
Figure 2 for Randomized Substitution and Vote for Textual Adversarial Example Detection
Figure 3 for Randomized Substitution and Vote for Textual Adversarial Example Detection
Figure 4 for Randomized Substitution and Vote for Textual Adversarial Example Detection
Viaarxiv icon

Multi-stage Optimization based Adversarial Training

Add code
Bookmark button
Alert button
Jun 26, 2021
Xiaosen Wang, Chuanbiao Song, Liwei Wang, Kun He

Figure 1 for Multi-stage Optimization based Adversarial Training
Figure 2 for Multi-stage Optimization based Adversarial Training
Figure 3 for Multi-stage Optimization based Adversarial Training
Figure 4 for Multi-stage Optimization based Adversarial Training
Viaarxiv icon

Enhancing the Transferability of Adversarial Attacks through Variance Tuning

Add code
Bookmark button
Alert button
Mar 29, 2021
Xiaosen Wang, Kun He

Figure 1 for Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Figure 2 for Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Figure 3 for Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Figure 4 for Enhancing the Transferability of Adversarial Attacks through Variance Tuning
Viaarxiv icon

Boosting Adversarial Transferability through Enhanced Momentum

Add code
Bookmark button
Alert button
Mar 19, 2021
Xiaosen Wang, Jiadong Lin, Han Hu, Jingdong Wang, Kun He

Figure 1 for Boosting Adversarial Transferability through Enhanced Momentum
Figure 2 for Boosting Adversarial Transferability through Enhanced Momentum
Figure 3 for Boosting Adversarial Transferability through Enhanced Momentum
Figure 4 for Boosting Adversarial Transferability through Enhanced Momentum
Viaarxiv icon

Admix: Enhancing the Transferability of Adversarial Attacks

Add code
Bookmark button
Alert button
Jan 31, 2021
Xiaosen Wang, Xuanran He, Jingdong Wang, Kun He

Figure 1 for Admix: Enhancing the Transferability of Adversarial Attacks
Figure 2 for Admix: Enhancing the Transferability of Adversarial Attacks
Figure 3 for Admix: Enhancing the Transferability of Adversarial Attacks
Figure 4 for Admix: Enhancing the Transferability of Adversarial Attacks
Viaarxiv icon