Author of the publication

GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning., , , , , and . CoRR, (2023)Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization., , , , and . IJCNN, page 1-8. IEEE, (2022)Amora: Black-box Adversarial Morphing Attack., , , , , , and . ACM Multimedia, page 1376-1385. ACM, (2020)FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction., , , , , , , , , and . ACM Multimedia, page 1217-1226. ACM, (2020)Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake., , , , , , , and . CoRR, (2024)MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm., , , , and . ACM Multimedia, page 2229-2236. ACM, (2020)Enhancing RAW-to-sRGB with Decoupled Style Structure in Fourier Domain., , , , , , , , , and 2 other author(s). AAAI, page 2130-2138. AAAI Press, (2024)Capturing the Persistence of Facial Expression Features for Deepfake Video Detection., , , , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 630-645. Springer, (2019)Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks., , , , , , , and . ACM Multimedia, page 8463-8474. ACM, (2023)Progressive Geological Modeling and Uncertainty Analysis Using Machine Learning., , , , , , and . ISPRS Int. J. Geo Inf., 12 (3): 97 (2023)