Alert button
Picture for Ximeng Liu

Ximeng Liu

Alert button

An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability

Aug 05, 2023
Bin Chen, Jia-Li Yin, Shukai Chen, Bo-Hao Chen, Ximeng Liu

Figure 1 for An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability
Figure 2 for An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability
Figure 3 for An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability
Figure 4 for An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability
Viaarxiv icon

Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data

Jul 01, 2023
Zekai Chen, Fuyi Wang, Zhiwei Zheng, Ximeng Liu, Yujie Lin

Figure 1 for Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data
Figure 2 for Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data
Figure 3 for Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data
Figure 4 for Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data
Viaarxiv icon

When Evolutionary Computation Meets Privacy

Mar 22, 2023
Bowen Zhao, Wei-Neng Chen, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Jun Zhang

Figure 1 for When Evolutionary Computation Meets Privacy
Figure 2 for When Evolutionary Computation Meets Privacy
Figure 3 for When Evolutionary Computation Meets Privacy
Figure 4 for When Evolutionary Computation Meets Privacy
Viaarxiv icon

SRoUDA: Meta Self-training for Robust Unsupervised Domain Adaptation

Dec 12, 2022
Wanqing Zhu, Jia-Li Yin, Bo-Hao Chen, Ximeng Liu

Figure 1 for SRoUDA: Meta Self-training for Robust Unsupervised Domain Adaptation
Figure 2 for SRoUDA: Meta Self-training for Robust Unsupervised Domain Adaptation
Figure 3 for SRoUDA: Meta Self-training for Robust Unsupervised Domain Adaptation
Figure 4 for SRoUDA: Meta Self-training for Robust Unsupervised Domain Adaptation
Viaarxiv icon

Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning

Dec 05, 2022
Mingyuan Fan, Cen Chen, Chengyu Wang, Wenmeng Zhou, Jun Huang, Ximeng Liu, Wenzhong Guo

Figure 1 for Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning
Figure 2 for Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning
Figure 3 for Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning
Figure 4 for Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning
Viaarxiv icon

MaskBlock: Transferable Adversarial Examples with Bayes Approach

Aug 13, 2022
Mingyuan Fan, Cen Chen, Ximeng Liu, Wenzhong Guo

Figure 1 for MaskBlock: Transferable Adversarial Examples with Bayes Approach
Figure 2 for MaskBlock: Transferable Adversarial Examples with Bayes Approach
Figure 3 for MaskBlock: Transferable Adversarial Examples with Bayes Approach
Figure 4 for MaskBlock: Transferable Adversarial Examples with Bayes Approach
Viaarxiv icon

Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons

Aug 13, 2022
Mingyuan Fan, Yang Liu, Cen Chen, Ximeng Liu, Wenzhong Guo

Figure 1 for Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Figure 2 for Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Figure 3 for Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Figure 4 for Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Viaarxiv icon

Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization

May 27, 2022
Bowen Zhao, Wei-Neng Chen, Feng-Feng Wei, Ximeng Liu, Qingqi Pei, Jun Zhang

Figure 1 for Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization
Figure 2 for Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization
Figure 3 for Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization
Figure 4 for Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization
Viaarxiv icon

Case-Aware Adversarial Training

Apr 20, 2022
Mingyuan Fan, Yang Liu, Wenzhong Guo, Ximeng Liu, Jianhua Li

Figure 1 for Case-Aware Adversarial Training
Figure 2 for Case-Aware Adversarial Training
Figure 3 for Case-Aware Adversarial Training
Figure 4 for Case-Aware Adversarial Training
Viaarxiv icon

Enhance transferability of adversarial examples with model architecture

Feb 28, 2022
Mingyuan Fan, Wenzhong Guo, Shengxing Yu, Zuobin Ying, Ximeng Liu

Figure 1 for Enhance transferability of adversarial examples with model architecture
Figure 2 for Enhance transferability of adversarial examples with model architecture
Figure 3 for Enhance transferability of adversarial examples with model architecture
Figure 4 for Enhance transferability of adversarial examples with model architecture
Viaarxiv icon