Picture for Yuefeng Chen

Yuefeng Chen

Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains

Add code
Feb 10, 2022
Figure 1 for Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Figure 2 for Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Figure 3 for Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Figure 4 for Beyond ImageNet Attack: Towards Crafting Adversarial Examples for Black-box Domains
Viaarxiv icon

Unrestricted Adversarial Attacks on ImageNet Competition

Add code
Oct 25, 2021
Figure 1 for Unrestricted Adversarial Attacks on ImageNet Competition
Figure 2 for Unrestricted Adversarial Attacks on ImageNet Competition
Figure 3 for Unrestricted Adversarial Attacks on ImageNet Competition
Viaarxiv icon

Adversarial Attacks on ML Defense Models Competition

Add code
Oct 15, 2021
Figure 1 for Adversarial Attacks on ML Defense Models Competition
Figure 2 for Adversarial Attacks on ML Defense Models Competition
Figure 3 for Adversarial Attacks on ML Defense Models Competition
Figure 4 for Adversarial Attacks on ML Defense Models Competition
Viaarxiv icon

AdvDrop: Adversarial Attack to DNNs by Dropping Information

Add code
Aug 20, 2021
Figure 1 for AdvDrop: Adversarial Attack to DNNs by Dropping Information
Figure 2 for AdvDrop: Adversarial Attack to DNNs by Dropping Information
Figure 3 for AdvDrop: Adversarial Attack to DNNs by Dropping Information
Figure 4 for AdvDrop: Adversarial Attack to DNNs by Dropping Information
Viaarxiv icon

Towards Robust Vision Transformer

Add code
May 26, 2021
Figure 1 for Towards Robust Vision Transformer
Figure 2 for Towards Robust Vision Transformer
Figure 3 for Towards Robust Vision Transformer
Figure 4 for Towards Robust Vision Transformer
Viaarxiv icon

QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval

Add code
Mar 23, 2021
Figure 1 for QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Figure 2 for QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Figure 3 for QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Figure 4 for QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval
Viaarxiv icon

Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink

Add code
Mar 11, 2021
Figure 1 for Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink
Figure 2 for Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink
Figure 3 for Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink
Figure 4 for Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink
Viaarxiv icon

Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain

Add code
Mar 10, 2021
Figure 1 for Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain
Figure 2 for Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain
Figure 3 for Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain
Figure 4 for Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain
Viaarxiv icon

Adversarial Examples Detection beyond Image Space

Add code
Feb 23, 2021
Figure 1 for Adversarial Examples Detection beyond Image Space
Figure 2 for Adversarial Examples Detection beyond Image Space
Figure 3 for Adversarial Examples Detection beyond Image Space
Figure 4 for Adversarial Examples Detection beyond Image Space
Viaarxiv icon

Composite Adversarial Attacks

Add code
Dec 10, 2020
Figure 1 for Composite Adversarial Attacks
Figure 2 for Composite Adversarial Attacks
Figure 3 for Composite Adversarial Attacks
Figure 4 for Composite Adversarial Attacks
Viaarxiv icon