Alert button
Picture for Shanqing Guo

Shanqing Guo

Alert button

AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection

Add code
Bookmark button
Alert button
Dec 14, 2023
Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao

Viaarxiv icon

RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks

Add code
Bookmark button
Alert button
Apr 17, 2023
Yunruo Zhang, Tianyu Du, Shouling Ji, Peng Tang, Shanqing Guo

Figure 1 for RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks
Figure 2 for RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks
Figure 3 for RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks
Figure 4 for RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks
Viaarxiv icon

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

Add code
Bookmark button
Alert button
Feb 22, 2022
Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang

Figure 1 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 2 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 3 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 4 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Viaarxiv icon

SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems

Add code
Bookmark button
Alert button
Mar 19, 2021
Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo

Figure 1 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 2 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 3 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Figure 4 for SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Viaarxiv icon

DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography

Add code
Bookmark button
Alert button
Mar 13, 2019
Zheng Li, Ge Han, Shanqing Guo, Chengyu Hu

Figure 1 for DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography
Figure 2 for DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography
Figure 3 for DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography
Figure 4 for DeepStego: Protecting Intellectual Property of Deep Neural Networks by Steganography
Viaarxiv icon

Learning Symmetric and Asymmetric Steganography via Adversarial Training

Add code
Bookmark button
Alert button
Mar 13, 2019
Zheng Li, Ge Han, Yunqing Wei, Shanqing Guo

Figure 1 for Learning Symmetric and Asymmetric Steganography via Adversarial Training
Figure 2 for Learning Symmetric and Asymmetric Steganography via Adversarial Training
Figure 3 for Learning Symmetric and Asymmetric Steganography via Adversarial Training
Figure 4 for Learning Symmetric and Asymmetric Steganography via Adversarial Training
Viaarxiv icon