Search Results for author: Lihua Jing

Found 3 papers, 2 papers with code

PAD: Patch-Agnostic Defense against Adversarial Patch Attacks

1 code implementation25 Apr 2024 Lihua Jing, Rui Wang, Wenqi Ren, Xin Dong, Cong Zou

Adversarial patch attacks present a significant threat to real-world object detectors due to their practical feasibility.

The Victim and The Beneficiary: Exploiting a Poisoned Model to Train a Clean Model on Poisoned Data

1 code implementation ICCV 2023 Zixuan Zhu, Rui Wang, Cong Zou, Lihua Jing

This inspires us to propose a novel dual-network training framework: The Victim and The Beneficiary (V&B), which exploits a poisoned model to train a clean model without extra benign samples.

Data Augmentation

Face Encryption via Frequency-Restricted Identity-Agnostic Attacks

no code implementations11 Aug 2023 Xin Dong, Rui Wang, Siyuan Liang, Aishan Liu, Lihua Jing

As for the weak black-box scenario feasibility, we obverse that representations of the average feature in multiple face recognition models are similar, thus we propose to utilize the average feature via the crawled dataset from the Internet as the target to guide the generation, which is also agnostic to identities of unknown face recognition systems; in nature, the low-frequency perturbations are more visually perceptible by the human vision system.

Face Recognition

Cannot find the paper you are looking for? You can Submit a new open access paper.