Alert button
Picture for Xinfeng Li

Xinfeng Li

Alert button

SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models

Add code
Bookmark button
Alert button
Apr 10, 2024
Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu

Viaarxiv icon

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time

Add code
Bookmark button
Alert button
Aug 03, 2023
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu

Figure 1 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 2 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 3 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Figure 4 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Viaarxiv icon

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim

Add code
Bookmark button
Alert button
Aug 02, 2023
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu

Figure 1 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim
Figure 2 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim
Figure 3 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim
Figure 4 for Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Tim
Viaarxiv icon

Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound

Add code
Bookmark button
Alert button
Jun 28, 2023
Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu

Figure 1 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 2 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 3 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Figure 4 for Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Viaarxiv icon

Beyond Universal Transformer: block reusing with adaptor in Transformer for automatic speech recognit

Add code
Bookmark button
Alert button
Mar 23, 2023
Haoyu Tang, Zhaoyi Liu, Chang Zeng, Xinfeng Li

Figure 1 for Beyond Universal Transformer: block reusing with adaptor in Transformer for automatic speech recognit
Figure 2 for Beyond Universal Transformer: block reusing with adaptor in Transformer for automatic speech recognit
Figure 3 for Beyond Universal Transformer: block reusing with adaptor in Transformer for automatic speech recognit
Figure 4 for Beyond Universal Transformer: block reusing with adaptor in Transformer for automatic speech recognit
Viaarxiv icon