Picture for Yu-an Tan

Yu-an Tan

Towards Transferable Adversarial Attacks with Centralized Perturbation

Dec 23, 2023
Viaarxiv icon

Unified High-binding Watermark for Unconditional Image Generation Models

Oct 14, 2023
Figure 1 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 2 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 3 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 4 for Unified High-binding Watermark for Unconditional Image Generation Models
Viaarxiv icon

Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples

Oct 12, 2023
Viaarxiv icon

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers

Jun 10, 2022
Figure 1 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 2 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 3 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 4 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Viaarxiv icon

l-Leaks: Membership Inference Attacks with Logits

May 13, 2022
Figure 1 for l-Leaks: Membership Inference Attacks with Logits
Figure 2 for l-Leaks: Membership Inference Attacks with Logits
Figure 3 for l-Leaks: Membership Inference Attacks with Logits
Figure 4 for l-Leaks: Membership Inference Attacks with Logits
Viaarxiv icon

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches

Apr 27, 2022
Figure 1 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 2 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 3 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 4 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Viaarxiv icon

Boosting Adversarial Transferability of MLP-Mixer

Apr 26, 2022
Figure 1 for Boosting Adversarial Transferability of MLP-Mixer
Figure 2 for Boosting Adversarial Transferability of MLP-Mixer
Figure 3 for Boosting Adversarial Transferability of MLP-Mixer
Figure 4 for Boosting Adversarial Transferability of MLP-Mixer
Viaarxiv icon

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity

Jul 03, 2021
Figure 1 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 2 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 3 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 4 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Viaarxiv icon