Alert button
Picture for Zhi Zhang

Zhi Zhang

Alert button

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Bookmark button
Alert button
Sep 06, 2022
Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

AI Enlightens Wireless Communication: A Transformer Backbone for CSI Feedback

Add code
Bookmark button
Alert button
Jun 16, 2022
Han Xiao, Zhiqin Wang, Dexin Li, Wenqiang Tian, Xiaofeng Liu, Wendong Liu, Shi Jin, Jia Shen, Zhi Zhang, Ning Yang

Figure 1 for AI Enlightens Wireless Communication: A Transformer Backbone for CSI Feedback
Figure 2 for AI Enlightens Wireless Communication: A Transformer Backbone for CSI Feedback
Figure 3 for AI Enlightens Wireless Communication: A Transformer Backbone for CSI Feedback
Figure 4 for AI Enlightens Wireless Communication: A Transformer Backbone for CSI Feedback
Viaarxiv icon

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences

Add code
Bookmark button
Alert button
May 31, 2022
Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo

Figure 1 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 2 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 3 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 4 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Viaarxiv icon

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

Add code
Bookmark button
Alert button
Apr 13, 2022
Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao

Figure 1 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 2 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 3 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 4 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Viaarxiv icon

BigDetection: A Large-scale Benchmark for Improved Object Detector Pre-training

Add code
Bookmark button
Alert button
Mar 24, 2022
Likun Cai, Zhi Zhang, Yi Zhu, Li Zhang, Mu Li, Xiangyang Xue

Figure 1 for BigDetection: A Large-scale Benchmark for Improved Object Detector Pre-training
Figure 2 for BigDetection: A Large-scale Benchmark for Improved Object Detector Pre-training
Figure 3 for BigDetection: A Large-scale Benchmark for Improved Object Detector Pre-training
Figure 4 for BigDetection: A Large-scale Benchmark for Improved Object Detector Pre-training
Viaarxiv icon

Deep AutoAugment

Add code
Bookmark button
Alert button
Mar 15, 2022
Yu Zheng, Zhi Zhang, Shen Yan, Mi Zhang

Figure 1 for Deep AutoAugment
Figure 2 for Deep AutoAugment
Figure 3 for Deep AutoAugment
Figure 4 for Deep AutoAugment
Viaarxiv icon

PPA: Preference Profiling Attack Against Federated Learning

Add code
Bookmark button
Alert button
Feb 10, 2022
Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang

Figure 1 for PPA: Preference Profiling Attack Against Federated Learning
Figure 2 for PPA: Preference Profiling Attack Against Federated Learning
Figure 3 for PPA: Preference Profiling Attack Against Federated Learning
Figure 4 for PPA: Preference Profiling Attack Against Federated Learning
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Add code
Bookmark button
Alert button
Jan 21, 2022
Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon

NTD: Non-Transferability Enabled Backdoor Detection

Add code
Bookmark button
Alert button
Nov 22, 2021
Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott

Figure 1 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 2 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 3 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 4 for NTD: Non-Transferability Enabled Backdoor Detection
Viaarxiv icon