Alert button
Picture for Ruigang Liang

Ruigang Liang

Alert button

MEA-Defender: A Robust Watermark against Model Extraction Attack

Add code
Bookmark button
Alert button
Jan 26, 2024
Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang

Viaarxiv icon

Boosting Neural Networks to Decompile Optimized Binaries

Add code
Bookmark button
Alert button
Jan 03, 2023
Ying Cao, Ruigang Liang, Kai Chen, Peiwei Hu

Figure 1 for Boosting Neural Networks to Decompile Optimized Binaries
Figure 2 for Boosting Neural Networks to Decompile Optimized Binaries
Figure 3 for Boosting Neural Networks to Decompile Optimized Binaries
Figure 4 for Boosting Neural Networks to Decompile Optimized Binaries
Viaarxiv icon

A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information

Add code
Bookmark button
Alert button
Oct 17, 2022
Pan Li, Peizhuo Lv, Shenchen Zhu, Ruigang Liang, Kai Chen

Figure 1 for A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information
Figure 2 for A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information
Figure 3 for A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information
Figure 4 for A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information
Viaarxiv icon

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

Add code
Bookmark button
Alert button
Sep 08, 2022
Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng

Figure 1 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 2 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 3 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 4 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Viaarxiv icon

Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain

Add code
Bookmark button
Alert button
Jul 09, 2022
Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen

Figure 1 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 2 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 3 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 4 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Viaarxiv icon

DBIA: Data-free Backdoor Injection Attack against Transformer Networks

Add code
Bookmark button
Alert button
Nov 22, 2021
Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang

Figure 1 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 2 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 3 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Figure 4 for DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Viaarxiv icon

HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks

Add code
Bookmark button
Alert button
Mar 25, 2021
Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li

Figure 1 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 2 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 3 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Figure 4 for HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Viaarxiv icon

Practical Adversarial Attack Against Object Detector

Add code
Bookmark button
Alert button
Dec 26, 2018
Yue Zhao, Hong Zhu, Qintao Shen, Ruigang Liang, Kai Chen, Shengzhi Zhang

Figure 1 for Practical Adversarial Attack Against Object Detector
Figure 2 for Practical Adversarial Attack Against Object Detector
Figure 3 for Practical Adversarial Attack Against Object Detector
Figure 4 for Practical Adversarial Attack Against Object Detector
Viaarxiv icon