Alert button
Picture for Zhengyu Zhao

Zhengyu Zhao

Alert button

Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving

Add code
Bookmark button
Alert button
Mar 27, 2024
Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen

Viaarxiv icon

Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval

Add code
Bookmark button
Alert button
Dec 12, 2023
Qiwei Tian, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen

Viaarxiv icon

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights

Add code
Bookmark button
Alert button
Oct 18, 2023
Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Chao Shen

Viaarxiv icon

Composite Backdoor Attacks Against Large Language Models

Add code
Bookmark button
Alert button
Oct 11, 2023
Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang

Figure 1 for Composite Backdoor Attacks Against Large Language Models
Figure 2 for Composite Backdoor Attacks Against Large Language Models
Figure 3 for Composite Backdoor Attacks Against Large Language Models
Figure 4 for Composite Backdoor Attacks Against Large Language Models
Viaarxiv icon

Prompt Backdoors in Visual Prompt Learning

Add code
Bookmark button
Alert button
Oct 11, 2023
Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang

Figure 1 for Prompt Backdoors in Visual Prompt Learning
Figure 2 for Prompt Backdoors in Visual Prompt Learning
Figure 3 for Prompt Backdoors in Visual Prompt Learning
Figure 4 for Prompt Backdoors in Visual Prompt Learning
Viaarxiv icon

Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection

Add code
Bookmark button
Alert button
Sep 03, 2023
Weijie Wang, Zhengyu Zhao, Nicu Sebe, Bruno Lepri

Figure 1 for Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Figure 2 for Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Figure 3 for Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Figure 4 for Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection
Viaarxiv icon

Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis

Add code
Bookmark button
Alert button
Jun 13, 2023
Yihan Ma, Zhengyu Zhao, Xinlei He, Zheng Li, Michael Backes, Yang Zhang

Figure 1 for Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Figure 2 for Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Figure 3 for Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Figure 4 for Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Viaarxiv icon

Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression

Add code
Bookmark button
Alert button
Jan 31, 2023
Zhuoran Liu, Zhengyu Zhao, Martha Larson

Figure 1 for Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Figure 2 for Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Figure 3 for Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Figure 4 for Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Viaarxiv icon

Towards Good Practices in Evaluating Transfer Adversarial Attacks

Add code
Bookmark button
Alert button
Nov 17, 2022
Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes

Figure 1 for Towards Good Practices in Evaluating Transfer Adversarial Attacks
Figure 2 for Towards Good Practices in Evaluating Transfer Adversarial Attacks
Figure 3 for Towards Good Practices in Evaluating Transfer Adversarial Attacks
Figure 4 for Towards Good Practices in Evaluating Transfer Adversarial Attacks
Viaarxiv icon

Generative Poisoning Using Random Discriminators

Add code
Bookmark button
Alert button
Nov 02, 2022
Dirren van Vlijmen, Alex Kolmus, Zhuoran Liu, Zhengyu Zhao, Martha Larson

Figure 1 for Generative Poisoning Using Random Discriminators
Figure 2 for Generative Poisoning Using Random Discriminators
Figure 3 for Generative Poisoning Using Random Discriminators
Figure 4 for Generative Poisoning Using Random Discriminators
Viaarxiv icon