Alert button
Picture for Donghua Wang

Donghua Wang

Alert button

Universal Perturbation-based Secret Key-Controlled Data Hiding

Add code
Bookmark button
Alert button
Nov 03, 2023
Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen

Viaarxiv icon

Adversarial Examples in the Physical World: A Survey

Add code
Bookmark button
Alert button
Nov 01, 2023
Jiakai Wang, Donghua Wang, Jin Hu, Siyang Wu, Tingsong Jiang, Wen Yao, Aishan Liu, Xianglong Liu

Figure 1 for Adversarial Examples in the Physical World: A Survey
Figure 2 for Adversarial Examples in the Physical World: A Survey
Figure 3 for Adversarial Examples in the Physical World: A Survey
Figure 4 for Adversarial Examples in the Physical World: A Survey
Viaarxiv icon

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World

Add code
Bookmark button
Alert button
Jul 14, 2023
Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen

Figure 1 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 2 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 3 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Figure 4 for RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World
Viaarxiv icon

Impact of Light and Shadow on Robustness of Deep Neural Networks

Add code
Bookmark button
Alert button
May 23, 2023
Chengyin Hu, Weiwen Shi, Chao Li, Jialiang Sun, Donghua Wang, Junqi Wu, Guijian Tang

Figure 1 for Impact of Light and Shadow on Robustness of Deep Neural Networks
Figure 2 for Impact of Light and Shadow on Robustness of Deep Neural Networks
Figure 3 for Impact of Light and Shadow on Robustness of Deep Neural Networks
Figure 4 for Impact of Light and Shadow on Robustness of Deep Neural Networks
Viaarxiv icon

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications

Add code
Bookmark button
Alert button
Apr 20, 2023
Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen

Figure 1 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 2 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 3 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Figure 4 for A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications
Viaarxiv icon

A Survey on Physical Adversarial Attack in Computer Vision

Add code
Bookmark button
Alert button
Sep 28, 2022
Donghua Wang, Wen Yao, Tingsong Jiang, Guijiang Tang, Xiaoqian Chen

Figure 1 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 2 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 3 for A Survey on Physical Adversarial Attack in Computer Vision
Figure 4 for A Survey on Physical Adversarial Attack in Computer Vision
Viaarxiv icon