Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in ACM MM 2021, 2021
In this paper, we propose AdvHash, the first targeted mismatch attack on deep hashing through adversarial patch.
Download here
Published in CVPR 2022, 2022
In this paper, we propose adversarial makeup transfer GAN (AMT-GAN), a novel face protection method aiming at constructing adversarial face images that preserve stronger black-box transferability and better visual quality simultaneously.
Download here
Published in CVPR 2023, 2023
In this paper, we propose the test-time corruption robustness consistency evaluation (TeCo), a novel test-time trigger sample detection method that only needs the hard-label outputs of the victim models without any extra information.
Download here
Published in ACM MM 2023, 2023
In this paper, we propose the first test-time backdoor sample detection method in 3D point cloud without assumption to the backdoor triggers.
Download here
Published in S&P 2024, 2024
In this paper, we take a further step towards understanding adversarial transferability, with a particular focus on surrogate aspects.
Download here
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.