Alert button
Picture for Yinpeng Dong

Yinpeng Dong

Alert button

Improving transferability of 3D adversarial attacks with scale and shear transformations

Add code
Bookmark button
Alert button
Nov 02, 2022
Jinali Zhang, Yinpeng Dong, Jun Zhu, Jihong Zhu, Minchi Kuang, Xiaming Yuan

Figure 1 for Improving transferability of 3D adversarial attacks with scale and shear transformations
Figure 2 for Improving transferability of 3D adversarial attacks with scale and shear transformations
Figure 3 for Improving transferability of 3D adversarial attacks with scale and shear transformations
Figure 4 for Improving transferability of 3D adversarial attacks with scale and shear transformations
Viaarxiv icon

Isometric 3D Adversarial Examples in the Physical World

Add code
Bookmark button
Alert button
Oct 27, 2022
Yibo Miao, Yinpeng Dong, Jun Zhu, Xiao-Shan Gao

Figure 1 for Isometric 3D Adversarial Examples in the Physical World
Figure 2 for Isometric 3D Adversarial Examples in the Physical World
Figure 3 for Isometric 3D Adversarial Examples in the Physical World
Figure 4 for Isometric 3D Adversarial Examples in the Physical World
Viaarxiv icon

ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial Viewpoints

Add code
Bookmark button
Alert button
Oct 08, 2022
Yinpeng Dong, Shouwei Ruan, Hang Su, Caixin Kang, Xingxing Wei, Jun Zhu

Figure 1 for ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial Viewpoints
Figure 2 for ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial Viewpoints
Figure 3 for ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial Viewpoints
Figure 4 for ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial Viewpoints
Viaarxiv icon

Pre-trained Adversarial Perturbations

Add code
Bookmark button
Alert button
Oct 07, 2022
Yuanhao Ban, Yinpeng Dong

Figure 1 for Pre-trained Adversarial Perturbations
Figure 2 for Pre-trained Adversarial Perturbations
Figure 3 for Pre-trained Adversarial Perturbations
Figure 4 for Pre-trained Adversarial Perturbations
Viaarxiv icon

GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing

Add code
Bookmark button
Alert button
Jun 09, 2022
Zhongkai Hao, Chengyang Ying, Yinpeng Dong, Hang Su, Jun Zhu, Jian Song

Figure 1 for GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing
Figure 2 for GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing
Figure 3 for GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing
Figure 4 for GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing
Viaarxiv icon

Kallima: A Clean-label Framework for Textual Backdoor Attacks

Add code
Bookmark button
Alert button
Jun 03, 2022
Xiaoyi Chen, Yinpeng Dong, Zeyu Sun, Shengfang Zhai, Qingni Shen, Zhonghai Wu

Figure 1 for Kallima: A Clean-label Framework for Textual Backdoor Attacks
Figure 2 for Kallima: A Clean-label Framework for Textual Backdoor Attacks
Figure 3 for Kallima: A Clean-label Framework for Textual Backdoor Attacks
Figure 4 for Kallima: A Clean-label Framework for Textual Backdoor Attacks
Viaarxiv icon

BadDet: Backdoor Attacks on Object Detection

Add code
Bookmark button
Alert button
May 28, 2022
Shih-Han Chan, Yinpeng Dong, Jun Zhu, Xiaolu Zhang, Jun Zhou

Figure 1 for BadDet: Backdoor Attacks on Object Detection
Figure 2 for BadDet: Backdoor Attacks on Object Detection
Figure 3 for BadDet: Backdoor Attacks on Object Detection
Figure 4 for BadDet: Backdoor Attacks on Object Detection
Viaarxiv icon

A Roadmap for Big Model

Add code
Bookmark button
Alert button
Apr 02, 2022
Sha Yuan, Hanyu Zhao, Shuai Zhao, Jiahong Leng, Yangxiao Liang, Xiaozhi Wang, Jifan Yu, Xin Lv, Zhou Shao, Jiaao He, Yankai Lin, Xu Han, Zhenghao Liu, Ning Ding, Yongming Rao, Yizhao Gao, Liang Zhang, Ming Ding, Cong Fang, Yisen Wang, Mingsheng Long, Jing Zhang, Yinpeng Dong, Tianyu Pang, Peng Cui, Lingxiao Huang, Zheng Liang, Huawei Shen, Hui Zhang, Quanshi Zhang, Qingxiu Dong, Zhixing Tan, Mingxuan Wang, Shuo Wang, Long Zhou, Haoran Li, Junwei Bao, Yingwei Pan, Weinan Zhang, Zhou Yu, Rui Yan, Chence Shi, Minghao Xu, Zuobai Zhang, Guoqiang Wang, Xiang Pan, Mengjie Li, Xiaoyu Chu, Zijun Yao, Fangwei Zhu, Shulin Cao, Weicheng Xue, Zixuan Ma, Zhengyan Zhang, Shengding Hu, Yujia Qin, Chaojun Xiao, Zheni Zeng, Ganqu Cui, Weize Chen, Weilin Zhao, Yuan Yao, Peng Li, Wenzhao Zheng, Wenliang Zhao, Ziyi Wang, Borui Zhang, Nanyi Fei, Anwen Hu, Zenan Ling, Haoyang Li, Boxi Cao, Xianpei Han, Weidong Zhan, Baobao Chang, Hao Sun, Jiawen Deng, Chujie Zheng, Juanzi Li, Lei Hou, Xigang Cao, Jidong Zhai, Zhiyuan Liu, Maosong Sun, Jiwen Lu, Zhiwu Lu, Qin Jin, Ruihua Song, Ji-Rong Wen, Zhouchen Lin, Liwei Wang, Hang Su, Jun Zhu, Zhifang Sui, Jiajun Zhang, Yang Liu, Xiaodong He, Minlie Huang, Jian Tang, Jie Tang

Figure 1 for A Roadmap for Big Model
Figure 2 for A Roadmap for Big Model
Figure 3 for A Roadmap for Big Model
Figure 4 for A Roadmap for Big Model
Viaarxiv icon

Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

Add code
Bookmark button
Alert button
Mar 13, 2022
Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu

Figure 1 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 2 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 3 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Figure 4 for Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior
Viaarxiv icon

Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition

Add code
Bookmark button
Alert button
Mar 10, 2022
Xiao Yang, Yinpeng Dong, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu

Figure 1 for Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Figure 2 for Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Figure 3 for Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Figure 4 for Controllable Evaluation and Generation of Physical Adversarial Patch on Face Recognition
Viaarxiv icon