关注
Siyuan Liang
Siyuan Liang
在 nus.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Transferable adversarial attacks for image and video object detection
X Wei, S Liang, N Chen, X Cao
arXiv preprint arXiv:1811.12641, 2018
2152018
Efficient adversarial attacks for visual object tracking
S Liang, X Wei, S Yao, X Cao
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
702020
Parallel rectangle flip attack: A query-based black-box attack against object detection
S Liang, B Wu, Y Fan, X Wei, X Cao
arXiv preprint arXiv:2201.08970, 2022
412022
{X-Adv}: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection
A Liu, J Guo, J Wang, S Liang, R Tao, W Zhou, C Liu, X Liu, D Tao
32nd USENIX Security Symposium (USENIX Security 23), 3781-3798, 2023
352023
A large-scale multiple-objective method for black-box attack against object detection
S Liang, L Li, Y Fan, X Jia, J Li, B Wu, X Cao
European Conference on Computer Vision, 619-636, 2022
212022
Generating transferable 3d adversarial point cloud via random perturbation factorization
B He, J Liu, Y Li, S Liang, J Li, X Jia, X Cao
Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 764-772, 2023
182023
Exploring the relationship between architectural design and adversarially robust generalization
A Liu, S Tang, S Liang, R Gong, B Wu, X Liu, D Tao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
18*2023
Imitated detectors: Stealing knowledge of black-box object detectors
S Liang, A Liu, J Liang, L Li, Y Bai, X Cao
Proceedings of the 30th ACM International Conference on Multimedia, 4839-4847, 2022
152022
Badclip: Dual-embedding guided backdoor attack on multimodal contrastive learning
S Liang, M Zhu, A Liu, B Wu, X Cao, EC Chang
arXiv preprint arXiv:2311.12075, 2023
82023
Improving robust fariness via balance adversarial training
C Sun, C Xu, C Yao, S Liang, Y Wu, D Liang, X Liu, A Liu
Proceedings of the AAAI Conference on Artificial Intelligence 37 (12), 15161 …, 2023
82023
Privacy-enhancing face obfuscation guided by semantic-aware attribution maps
J Li, H Zhang, S Liang, P Dai, X Cao
IEEE Transactions on Information Forensics and Security, 2023
82023
Generate more imperceptible adversarial examples for object detection
S Liang, X Wei, X Cao
ICML 2021 Workshop on Adversarial Machine Learning, 2021
82021
Adaptive perturbation generation for multiple backdoors detection
Y Wang, H Shi, R Min, R Wu, S Liang, Y Wu, D Liang, A Liu
arXiv preprint arXiv:2209.05244, 2022
72022
Pre-trained trojan attacks for visual recognition
A Liu, X Zhang, Y Xiao, Y Zhou, S Liang, J Wang, X Liu, X Cao, D Tao
arXiv preprint arXiv:2312.15172, 2023
62023
Diversifying the High-level Features for better Adversarial Transferability
Z Wang, Z Zhang, S Liang, X Wang
arXiv preprint arXiv:2304.10136, 2023
62023
Improving adversarial transferability by stable diffusion
J Liu, S Zhu, S Liang, J Zhang, H Fang, W Zhang, EC Chang
arXiv preprint arXiv:2311.11017, 2023
52023
Exploring inconsistent knowledge distillation for object detection with data augmentation
J Liang, S Liang, A Liu, K Ma, J Li, X Cao
Proceedings of the 31st ACM International Conference on Multimedia, 768-778, 2023
52023
SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation
B He, X Jia, S Liang, T Lou, Y Liu, X Cao
arXiv preprint arXiv:2312.04913, 2023
42023
Learning to optimize permutation flow shop scheduling via graph-based imitation learning
L Li, S Liang, Z Zhu, C Ding, H Zha, B Wu
Proceedings of the AAAI Conference on Artificial Intelligence 38 (18), 20185 …, 2024
32024
VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models
J Liang, S Liang, M Luo, A Liu, D Han, EC Chang, X Cao
arXiv preprint arXiv:2402.13851, 2024
32024
系统目前无法执行此操作,请稍后再试。
文章 1–20