Alert button
Picture for Yu-an Tan

Yu-an Tan

Alert button

Towards Transferable Adversarial Attacks with Centralized Perturbation

Add code
Bookmark button
Alert button
Dec 23, 2023
Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li

Viaarxiv icon

Unified High-binding Watermark for Unconditional Image Generation Models

Add code
Bookmark button
Alert button
Oct 14, 2023
Ruinan Ma, Yu-an Tan, Shangbo Wu, Tian Chen, Yajie Wang, Yuanzhang Li

Viaarxiv icon

Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples

Add code
Bookmark button
Alert button
Oct 12, 2023
Ruinan Ma, Canjie Zhu, Mingfeng Lu, Yunjie Li, Yu-an Tan, Ruibin Zhang, Ran Tao

Viaarxiv icon

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers

Add code
Bookmark button
Alert button
Jun 10, 2022
Nan Luo, Yuanzhang Li, Yajie Wang, Shangbo Wu, Yu-an Tan, Quanxin Zhang

Figure 1 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 2 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 3 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 4 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Viaarxiv icon

l-Leaks: Membership Inference Attacks with Logits

Add code
Bookmark button
Alert button
May 13, 2022
Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan

Figure 1 for l-Leaks: Membership Inference Attacks with Logits
Figure 2 for l-Leaks: Membership Inference Attacks with Logits
Figure 3 for l-Leaks: Membership Inference Attacks with Logits
Figure 4 for l-Leaks: Membership Inference Attacks with Logits
Viaarxiv icon

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches

Add code
Bookmark button
Alert button
Apr 27, 2022
Huipeng Zhou, Yu-an Tan, Yajie Wang, Haoran Lyu, Shangbo Wu, Yuanzhang Li

Figure 1 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 2 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 3 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 4 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Viaarxiv icon

Boosting Adversarial Transferability of MLP-Mixer

Add code
Bookmark button
Alert button
Apr 26, 2022
Haoran Lyu, Yajie Wang, Yu-an Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang

Figure 1 for Boosting Adversarial Transferability of MLP-Mixer
Figure 2 for Boosting Adversarial Transferability of MLP-Mixer
Figure 3 for Boosting Adversarial Transferability of MLP-Mixer
Figure 4 for Boosting Adversarial Transferability of MLP-Mixer
Viaarxiv icon

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity

Add code
Bookmark button
Alert button
Jul 03, 2021
Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang

Figure 1 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 2 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 3 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 4 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Viaarxiv icon