Follow
Jing Wu
Title
Cited by
Cited by
Year
Dast: Data-free substitute training for adversarial attacks
M Zhou, J Wu, Y Liu, S Liu, C Zhu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
1412020
A survey on universal adversarial attack
C Zhang, P Benz, C Lin, A Karjauv, J Wu, IS Kweon
Proceedings of the Thirtieth International Joint Conference on Artificial …, 2021
812021
Performance evaluation of adversarial attacks: Discrepancies and solutions
J Wu, M Zhou, C Zhu, Y Liu, M Harandi, L Li
arXiv preprint arXiv:2104.11103, 2021
92021
Decision-based universal adversarial attack
J Wu, M Zhou, S Liu, Y Liu, C Zhu
arXiv preprint arXiv:2009.07024, 2020
72020
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-based Systems
M Zhou, X Gao, J Wu, J Grundy, X Chen, C Chen, L Li
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
32023
Erasediff: Erasing data influence in diffusion models
J Wu, T Le, M Hayat, M Harandi
arXiv preprint arXiv:2401.05779, 2024
22024
Concealing Sensitive Samples against Gradient Leakage in Federated Learning
J Wu, M Hayat, M Zhou, M Harandi
Proceedings of the AAAI conference on artificial intelligence, 2022
2*2022
Analyzing the pregnancy status of giant pandas with hierarchical behavioral information
X Li, J Wu, R Hou, Z Zhou, C Duan, P Liu, M He, Y Zhou, P Chen, C Zhu
Expert Systems with Applications 237, 121462, 2024
2024
Scissorhands: Scrub Data Influence via Connection Sensitivity in Networks
J Wu, M Harandi
arXiv preprint arXiv:2401.06187, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–9