Alert button
Picture for Di Tang

Di Tang

Alert button

DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance

Add code
Bookmark button
Alert button
Mar 20, 2024
Zixuan Wang, Jia Jia, Shikun Sun, Haozhe Wu, Rong Han, Zhenyu Li, Di Tang, Jiaqing Zhou, Jiebo Luo

Figure 1 for DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance
Figure 2 for DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance
Figure 3 for DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance
Figure 4 for DanceCamera3D: 3D Camera Movement Synthesis with Music and Dance
Viaarxiv icon

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

Add code
Bookmark button
Alert button
Jan 29, 2023
Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang

Figure 1 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 2 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 3 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Figure 4 for Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Viaarxiv icon

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models

Add code
Bookmark button
Alert button
Dec 09, 2022
Rui Zhu, Di Tang, Siyuan Tang, XiaoFeng Wang, Haixu Tang

Figure 1 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 2 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 3 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 4 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Viaarxiv icon

Understanding Impacts of Task Similarity on Backdoor Attack and Detection

Add code
Bookmark button
Alert button
Oct 12, 2022
Di Tang, Rui Zhu, XiaoFeng Wang, Haixu Tang, Yi Chen

Figure 1 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 2 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 3 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Figure 4 for Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Viaarxiv icon

Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models

Add code
Bookmark button
Alert button
Sep 14, 2022
Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu

Figure 1 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 2 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 3 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Figure 4 for Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Viaarxiv icon

Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints

Add code
Bookmark button
Alert button
Aug 22, 2018
Di Tang, XiaoFeng Wang, Kehuan Zhang

Figure 1 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 2 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 3 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Figure 4 for Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints
Viaarxiv icon

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections

Add code
Bookmark button
Alert button
Aug 22, 2018
Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang

Figure 1 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 2 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 3 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Figure 4 for Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Viaarxiv icon