Picture for Yajie Wang

Yajie Wang

Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment based on Anthropic Prior Knowledge

Add code
Apr 01, 2024
Viaarxiv icon

Towards Transferable Adversarial Attacks with Centralized Perturbation

Add code
Dec 23, 2023
Figure 1 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 2 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 3 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 4 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Viaarxiv icon

Unified High-binding Watermark for Unconditional Image Generation Models

Add code
Oct 14, 2023
Figure 1 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 2 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 3 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 4 for Unified High-binding Watermark for Unconditional Image Generation Models
Viaarxiv icon

Artificial Intelligence Security Competition (AISC)

Add code
Dec 07, 2022
Figure 1 for Artificial Intelligence Security Competition (AISC)
Figure 2 for Artificial Intelligence Security Competition (AISC)
Figure 3 for Artificial Intelligence Security Competition (AISC)
Figure 4 for Artificial Intelligence Security Competition (AISC)
Viaarxiv icon

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers

Add code
Jun 10, 2022
Figure 1 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 2 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 3 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 4 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Viaarxiv icon

l-Leaks: Membership Inference Attacks with Logits

Add code
May 13, 2022
Figure 1 for l-Leaks: Membership Inference Attacks with Logits
Figure 2 for l-Leaks: Membership Inference Attacks with Logits
Figure 3 for l-Leaks: Membership Inference Attacks with Logits
Figure 4 for l-Leaks: Membership Inference Attacks with Logits
Viaarxiv icon

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches

Add code
Apr 27, 2022
Figure 1 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 2 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 3 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 4 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Viaarxiv icon

Boosting Adversarial Transferability of MLP-Mixer

Add code
Apr 26, 2022
Figure 1 for Boosting Adversarial Transferability of MLP-Mixer
Figure 2 for Boosting Adversarial Transferability of MLP-Mixer
Figure 3 for Boosting Adversarial Transferability of MLP-Mixer
Figure 4 for Boosting Adversarial Transferability of MLP-Mixer
Viaarxiv icon

Unrestricted Adversarial Attacks on ImageNet Competition

Add code
Oct 25, 2021
Figure 1 for Unrestricted Adversarial Attacks on ImageNet Competition
Figure 2 for Unrestricted Adversarial Attacks on ImageNet Competition
Figure 3 for Unrestricted Adversarial Attacks on ImageNet Competition
Viaarxiv icon

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity

Add code
Jul 03, 2021
Figure 1 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 2 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 3 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 4 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Viaarxiv icon