Search Results for author: Derui Wang

Found 11 papers, 5 papers with code

LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model

no code implementations18 Mar 2024 Yuxin Cao, Jinghao Li, Xi Xiao, Derui Wang, Minhui Xue, Hao Ge, Wei Liu, Guangwu Hu

Benefiting from the popularity and scalably usability of Segment Anything Model (SAM), we first extract different regions according to semantic information and then track them through the video stream to maintain the temporal consistency.

Adversarial Attack Style Transfer +2

Reinforcement Unlearning

no code implementations26 Dec 2023 Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Zewei Shi, Sheng Shen, Wanlei Zhou, Minhui Xue

Machine unlearning refers to the process of mitigating the influence of specific training data on machine learning models based on removal requests from data owners.

Inference Attack Machine Unlearning +1

LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer

1 code implementation15 Dec 2023 Yuxin Cao, Ziyu Zhao, Xi Xiao, Derui Wang, Minhui Xue, Jin Lu

We separate the attack into three stages: style reference selection, reinforcement-learning-based logo style transfer, and perturbation optimization.

reinforcement-learning Style Transfer +1

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding

no code implementations25 Nov 2023 Bingbing Song, Derui Wang, Tianwei Zhang, Renyang Liu, Yu Lin, Wei Zhou

Hence, it provides a way to directly generate stego images from secret images without a cover image.

Steganalysis

The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices

1 code implementation23 Sep 2022 Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang

However, recent advanced backdoor attacks show that this assumption is no longer valid in dynamic backdoors where the triggers vary from input to input, thereby defeating the existing defenses.

valid

Visual Subtitle Feature Enhanced Video Outline Generation

no code implementations24 Aug 2022 Qi Lv, Ziqiang Cao, Wenrui Xie, Derui Wang, Jingwen Wang, Zhiwei Hu, Tangkun Zhang, Ba Yuan, Yuanhang Li, Min Cao, Wenjie Li, Sujian Li, Guohong Fu

Furthermore, based on the similarity between video outlines and textual outlines, we use a large number of articles with chapter headings to pretrain our model.

Headline Generation Navigate +4

KE-QI: A Knowledge Enhanced Article Quality Identification Dataset

no code implementations15 Jun 2022 Chunhui Ai, Derui Wang, Xu Yan, Yang Xu, Wenrui Xie, Ziqiang Cao

With so many articles of varying qualities being produced every moment, it is a very urgent task to screen outstanding articles and commit them to social media.

Text Classification

StyleFool: Fooling Video Classification Systems via Style Transfer

1 code implementation30 Mar 2022 Yuxin Cao, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen

In this paper, we focus on unrestricted perturbations and propose StyleFool, a black-box video adversarial attack via style transfer to fool the video classification system.

Adversarial Attack Classification +3

STRIP: A Defence Against Trojan Attacks on Deep Neural Networks

4 code implementations18 Feb 2019 Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal

Since the trojan trigger is a secret guarded and exploited by the attacker, detecting such trojan inputs is a challenge, especially at run-time when models are in active operation.

Cryptography and Security

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

no code implementations10 Aug 2018 Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren

In contrast to existing works, the adversarial examples crafted by our method can also deceive recent machine learning based detectors that rely on semantic features such as control-flow-graph.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.