no code implementations • 30 Dec 2023 • Qiannan Wang, Changchun Yin, Liming Fang, Lu Zhou, Zhe Liu, Run Wang, Chenhao Lin
The extensive adoption of Self-supervised learning (SSL) has led to an increased security threat from backdoor attacks.
no code implementations • 1 Oct 2023 • Qiannan Wang, Changchun Yin, Zhe Liu, Liming Fang, Run Wang, Chenhao Lin
Pre-trained image encoders can serve as feature extractors, facilitating the construction of downstream classifiers for various tasks.
no code implementations • 9 Aug 2023 • Xiaobei Li, Changchun Yin, Liyue Zhu, Xiaogang Xu, Liming Fang, Run Wang, Chenhao Lin
Self-supervised learning (SSL), a paradigm harnessing unlabeled datasets to train robust encoders, has recently witnessed substantial success.
no code implementations • 3 Aug 2023 • Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang
Adversarial training (AT) is widely considered the state-of-the-art technique for improving the robustness of deep neural networks (DNNs) against adversarial examples (AE).
1 code implementation • 29 Jul 2023 • Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang
In recent decades, Generative Adversarial Network (GAN) and its variants have achieved unprecedented success in image synthesis.
no code implementations • 27 Feb 2023 • Guodong Huang, Chuan Ma, Ming Ding, Yuwen Qian, Chunpeng Ge, Liming Fang, Zhe Liu
To achieve a configurable trade-off between the defense and the network overhead, we further improve the list-based defense by a traffic splitting mechanism, which can combat the mentioned attacks as well as save a considerable amount of network overhead.
1 code implementation • 3 Jan 2023 • Xihong Yang, Yue Liu, Sihang Zhou, Siwei Wang, Wenxuan Tu, Qun Zheng, Xinwang Liu, Liming Fang, En Zhu
Then, guided by the high-confidence clustering information, we carefully select and construct the positive samples from the same high-confidence cluster in two views.
1 code implementation • ICCV 2023 • Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang
In recent decades, Generative Adversarial Network (GAN) and its variants have achieved unprecedented success in image synthesis.
no code implementations • 16 Apr 2021 • Bo Zhao, Peng Sun, Liming Fang, Tao Wang, Keyu Jiang
The results demonstrate its effectiveness and superior performance compared to the state-of-the-art Byzantine-robust schemes in defending against typical data poisoning and model poisoning attacks under practical Non-IID data distributions.