Alert button
Picture for Wanlei Zhou

Wanlei Zhou

Alert button

Machine Unlearning via Null Space Calibration

Add code
Bookmark button
Alert button
Apr 21, 2024
Huiqiang Chen, Tianqing Zhu, Xin Yu, Wanlei Zhou

Viaarxiv icon

Reinforcement Unlearning

Add code
Bookmark button
Alert button
Dec 26, 2023
Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Jason, Xue, Sheng Shen, Wanlei Zhou

Viaarxiv icon

FD-MIA: Efficient Attacks on Fairness-enhanced Models

Add code
Bookmark button
Alert button
Nov 07, 2023
Huan Tian, Guangsheng Zhang, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou

Viaarxiv icon

Generative Adversarial Networks Unlearning

Add code
Bookmark button
Alert button
Aug 19, 2023
Hui Sun, Tianqing Zhu, Wenhan Chang, Wanlei Zhou

Figure 1 for Generative Adversarial Networks Unlearning
Figure 2 for Generative Adversarial Networks Unlearning
Figure 3 for Generative Adversarial Networks Unlearning
Figure 4 for Generative Adversarial Networks Unlearning
Viaarxiv icon

Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms

Add code
Bookmark button
Alert button
Aug 18, 2023
Penghui Wen, Kun Hu, Wenxi Yue, Sen Zhang, Wanlei Zhou, Zhiyong Wang

Figure 1 for Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms
Figure 2 for Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms
Figure 3 for Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms
Figure 4 for Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms
Viaarxiv icon

Privacy and Fairness in Federated Learning: on the Perspective of Trade-off

Add code
Bookmark button
Alert button
Jun 25, 2023
Huiqiang Chen, Tianqing Zhu, Tao Zhang, Wanlei Zhou, Philip S. Yu

Figure 1 for Privacy and Fairness in Federated Learning: on the Perspective of Trade-off
Figure 2 for Privacy and Fairness in Federated Learning: on the Perspective of Trade-off
Figure 3 for Privacy and Fairness in Federated Learning: on the Perspective of Trade-off
Figure 4 for Privacy and Fairness in Federated Learning: on the Perspective of Trade-off
Viaarxiv icon

Boosting Model Inversion Attacks with Adversarial Examples

Add code
Bookmark button
Alert button
Jun 24, 2023
Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou

Figure 1 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 2 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 3 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 4 for Boosting Model Inversion Attacks with Adversarial Examples
Viaarxiv icon

Machine Unlearning: A Survey

Add code
Bookmark button
Alert button
Jun 06, 2023
Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu

Figure 1 for Machine Unlearning: A Survey
Figure 2 for Machine Unlearning: A Survey
Figure 3 for Machine Unlearning: A Survey
Figure 4 for Machine Unlearning: A Survey
Viaarxiv icon

Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation

Add code
Bookmark button
Alert button
Jun 02, 2023
Chi Liu, Tianqing Zhu, Sheng Shen, Wanlei Zhou

Figure 1 for Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation
Figure 2 for Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation
Figure 3 for Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation
Figure 4 for Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation
Viaarxiv icon

Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness

Add code
Bookmark button
Alert button
Mar 23, 2023
Huajie Chen, Tianqing Zhu, Yuan Zhao, Bo Liu, Xin Yu, Wanlei Zhou

Figure 1 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 2 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 3 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 4 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Viaarxiv icon