Alert button
Picture for Zhuoran Liu

Zhuoran Liu

Alert button

Panoptic Perception: A Novel Task and Fine-grained Dataset for Universal Remote Sensing Image Interpretation

Add code
Bookmark button
Alert button
Apr 06, 2024
Danpei Zhao, Bo Yuan, Ziqiang Chen, Tian Li, Zhuoran Liu, Wentao Li, Yue Gao

Viaarxiv icon

Beyond Neural-on-Neural Approaches to Speaker Gender Protection

Add code
Bookmark button
Alert button
Jun 30, 2023
Loes van Bemmel, Zhuoran Liu, Nik Vaessen, Martha Larson

Figure 1 for Beyond Neural-on-Neural Approaches to Speaker Gender Protection
Figure 2 for Beyond Neural-on-Neural Approaches to Speaker Gender Protection
Figure 3 for Beyond Neural-on-Neural Approaches to Speaker Gender Protection
Figure 4 for Beyond Neural-on-Neural Approaches to Speaker Gender Protection
Viaarxiv icon

Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression

Add code
Bookmark button
Alert button
Jan 31, 2023
Zhuoran Liu, Zhengyu Zhao, Martha Larson

Figure 1 for Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Figure 2 for Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Figure 3 for Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Figure 4 for Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Viaarxiv icon

Generative Poisoning Using Random Discriminators

Add code
Bookmark button
Alert button
Nov 02, 2022
Dirren van Vlijmen, Alex Kolmus, Zhuoran Liu, Zhengyu Zhao, Martha Larson

Figure 1 for Generative Poisoning Using Random Discriminators
Figure 2 for Generative Poisoning Using Random Discriminators
Figure 3 for Generative Poisoning Using Random Discriminators
Figure 4 for Generative Poisoning Using Random Discriminators
Viaarxiv icon

Monolith: Real Time Recommendation System With Collisionless Embedding Table

Add code
Bookmark button
Alert button
Sep 27, 2022
Zhuoran Liu, Leqi Zou, Xuan Zou, Caihua Wang, Biao Zhang, Da Tang, Bolin Zhu, Yijie Zhu, Peng Wu, Ke Wang, Youlong Cheng

Figure 1 for Monolith: Real Time Recommendation System With Collisionless Embedding Table
Figure 2 for Monolith: Real Time Recommendation System With Collisionless Embedding Table
Figure 3 for Monolith: Real Time Recommendation System With Collisionless Embedding Table
Figure 4 for Monolith: Real Time Recommendation System With Collisionless Embedding Table
Viaarxiv icon

Domain Constraints in Feature Space: Strengthening Robustness of Android Malware Detection against Realizable Adversarial Examples

Add code
Bookmark button
Alert button
May 30, 2022
Hamid Bostani, Zhuoran Liu, Zhengyu Zhao, Veelasha Moonsamy

Figure 1 for Domain Constraints in Feature Space: Strengthening Robustness of Android Malware Detection against Realizable Adversarial Examples
Figure 2 for Domain Constraints in Feature Space: Strengthening Robustness of Android Malware Detection against Realizable Adversarial Examples
Figure 3 for Domain Constraints in Feature Space: Strengthening Robustness of Android Malware Detection against Realizable Adversarial Examples
Figure 4 for Domain Constraints in Feature Space: Strengthening Robustness of Android Malware Detection against Realizable Adversarial Examples
Viaarxiv icon

Going Grayscale: The Road to Understanding and Improving Unlearnable Examples

Add code
Bookmark button
Alert button
Nov 25, 2021
Zhuoran Liu, Zhengyu Zhao, Alex Kolmus, Tijn Berns, Twan van Laarhoven, Tom Heskes, Martha Larson

Figure 1 for Going Grayscale: The Road to Understanding and Improving Unlearnable Examples
Figure 2 for Going Grayscale: The Road to Understanding and Improving Unlearnable Examples
Figure 3 for Going Grayscale: The Road to Understanding and Improving Unlearnable Examples
Figure 4 for Going Grayscale: The Road to Understanding and Improving Unlearnable Examples
Viaarxiv icon

On Success and Simplicity: A Second Look at Transferable Targeted Attacks

Add code
Bookmark button
Alert button
Dec 21, 2020
Zhengyu Zhao, Zhuoran Liu, Martha Larson

Figure 1 for On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Figure 2 for On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Figure 3 for On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Figure 4 for On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Viaarxiv icon

Adversarial Robustness Against Image Color Transformation within Parametric Filter Space

Add code
Bookmark button
Alert button
Nov 12, 2020
Zhengyu Zhao, Zhuoran Liu, Martha Larson

Figure 1 for Adversarial Robustness Against Image Color Transformation within Parametric Filter Space
Figure 2 for Adversarial Robustness Against Image Color Transformation within Parametric Filter Space
Figure 3 for Adversarial Robustness Against Image Color Transformation within Parametric Filter Space
Figure 4 for Adversarial Robustness Against Image Color Transformation within Parametric Filter Space
Viaarxiv icon

Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start

Add code
Bookmark button
Alert button
Jun 11, 2020
Zhuoran Liu, Martha Larson

Figure 1 for Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start
Figure 2 for Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start
Figure 3 for Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start
Figure 4 for Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start
Viaarxiv icon