Picture for Yu-an Tan

Yu-an Tan

Towards Transferable Adversarial Attacks with Centralized Perturbation

Add code
Dec 23, 2023
Figure 1 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 2 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 3 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Figure 4 for Towards Transferable Adversarial Attacks with Centralized Perturbation
Viaarxiv icon

Unified High-binding Watermark for Unconditional Image Generation Models

Add code
Oct 14, 2023
Figure 1 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 2 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 3 for Unified High-binding Watermark for Unconditional Image Generation Models
Figure 4 for Unified High-binding Watermark for Unconditional Image Generation Models
Viaarxiv icon

Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples

Add code
Oct 12, 2023
Figure 1 for Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples
Figure 2 for Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples
Figure 3 for Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples
Figure 4 for Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples
Viaarxiv icon

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers

Add code
Jun 10, 2022
Figure 1 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 2 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 3 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Figure 4 for Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Viaarxiv icon

l-Leaks: Membership Inference Attacks with Logits

Add code
May 13, 2022
Figure 1 for l-Leaks: Membership Inference Attacks with Logits
Figure 2 for l-Leaks: Membership Inference Attacks with Logits
Figure 3 for l-Leaks: Membership Inference Attacks with Logits
Figure 4 for l-Leaks: Membership Inference Attacks with Logits
Viaarxiv icon

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches

Add code
Apr 27, 2022
Figure 1 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 2 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 3 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Figure 4 for Improving the Transferability of Adversarial Examples with Restructure Embedded Patches
Viaarxiv icon

Boosting Adversarial Transferability of MLP-Mixer

Add code
Apr 26, 2022
Figure 1 for Boosting Adversarial Transferability of MLP-Mixer
Figure 2 for Boosting Adversarial Transferability of MLP-Mixer
Figure 3 for Boosting Adversarial Transferability of MLP-Mixer
Figure 4 for Boosting Adversarial Transferability of MLP-Mixer
Viaarxiv icon

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity

Add code
Jul 03, 2021
Figure 1 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 2 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 3 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Figure 4 for Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
Viaarxiv icon