Picture for Zeyan Liu

Zeyan Liu

IDMap: A Pseudo-Speaker Generator Framework Based on Speaker Identity Index to Vector Mapping

Add code
Nov 09, 2025
Viaarxiv icon

Pinhole Effect on Linkability and Dispersion in Speaker Anonymization

Add code
Aug 23, 2025
Viaarxiv icon

Two Birds with One Stone: Multi-Task Detection and Attribution of LLM-Generated Text

Add code
Aug 19, 2025
Viaarxiv icon

Exploring Audio-Visual Information Fusion for Sound Event Localization and Detection In Low-Resource Realistic Scenarios

Add code
Jun 21, 2024
Viaarxiv icon

The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking

Add code
Apr 22, 2024
Figure 1 for The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
Figure 2 for The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
Figure 3 for The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
Figure 4 for The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
Viaarxiv icon

Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT

Add code
Jun 07, 2023
Figure 1 for Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT
Figure 2 for Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT
Figure 3 for Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT
Figure 4 for Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT
Viaarxiv icon

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Add code
May 31, 2022
Figure 1 for Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Figure 2 for Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Figure 3 for Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Figure 4 for Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Viaarxiv icon