Black Dong Attack
Restricted Adversarial Against DeepFake Face
Restricted Adversarial Against DeepFake Face Swapping. Authors:Junhao Yuan Wang, Jianhuang Lai, Xiaohua Xie.
A survey of hole in wireless mobile ad hoc networks
In the mobile ad hoc networks, a malicious node probably drops or consumes the packets. This suspicious node can be regarded as a hole
Efficient Decision-based Adversarial on Face
Efficient Decision-based Adversarial on Face Recognition. Authors:Yinpeng Hang Su, Baoyuan Wu, Zhifeng Li, Wei Liu, Tong
Improving Adversarial with a Transfer-based Prior
Authors. Shuyu Cheng, Yinpeng Tianyu Pang, Hang Su, Jun Zhu. Abstract. We consider the adversarial setting, where the adversary has to generate
Detection of Backdoor with Limited Information
Detection of Backdoor with Limited Information and Data. Authors:Yinpeng Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao
Improving Adversarial with a Transfer-based Prior
[8] Yinpeng Tianyu Pang, Hang Su, and Jun Zhu. Evading defenses to transferable adversarial examples by translation-invariant In Proceedings of
Efficient Decision-Based Adversarial on Face
Transfer-based generate adversarial examples for a white-box model and the model based on F. Liao, T. Pang, H. Su, J. Zhu, X.
Yinpeng - Google 学术搜索
Efficient decision-based adversarial on face recognition. Y H Su, B Wu, Z Li, W Liu, T Zhang, J Zhu. proceedings of the IEEE/CVF
I played with a random guy named "Big Clock" and then found
I think he had a heart upon seeing a bigger, cock. Reply reply. u/Tuhniina avatar · Tuhniina. •. Big Clock couldn't handle
The full experimental results of against JPEG
Improving Adversarial with a Transfer-based Prior. Preprint. Full-text available. Jun 2019. Shuyu Cheng · Yinpeng