Search Results for author: Yanjiao Chen

Found 8 papers, 1 papers with code

SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models

no code implementations19 Apr 2024 Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu

In addition, we carefully design the optimization process to entrap the pre-trained model within a hard-to-escape local optimum regarding restricted domains.

SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models

1 code implementation10 Apr 2024 Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu

The key idea is to eliminate unsafe visual representations from the model regardless of the text input.

Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion

no code implementations24 Feb 2023 Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu

Voice conversion (VC) techniques can be abused by malicious parties to transform their audios to sound like a target speaker, making it hard for a human being or a speaker verification/identification system to trace the source speaker.

Representation Learning Speaker Verification +1

$Radar^2$: Passive Spy Radar Detection and Localization using COTS mmWave Radar

no code implementations10 Jan 2022 Yanlong Qiu, Jiaxi Zhang, Yanjiao Chen, Jin Zhang, Bo Ji

Specifically, we propose a novel \textit{Frequency Component Detection} method to detect the existence of mmWave signals, distinguish between mmWave radar and WiGig signals using a waveform classifier based on a convolutional neural network (CNN), and localize spy radars using triangulation based on the detector's observations at multiple anchor points.

Autonomous Driving

MARNET: Backdoor Attacks against Value-Decomposition Multi-Agent Reinforcement Learning

no code implementations29 Sep 2021 Yanjiao Chen, Zhicong Zheng, Xueluan Gong

Recent works have revealed that backdoor attacks against Deep Reinforcement Learning (DRL) could lead to abnormal action selection of the agent, which may result in failure or even catastrophe in crucial decision processes.

Backdoor Attack reinforcement-learning +4

FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants

no code implementations21 Sep 2021 Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu

In the area of Internet of Things (IoT) voice assistants have become an important interface to operate smart speakers, smartphones, and even automobiles.

Privacy-Preserving Collaborative Deep Learning with Unreliable Participants

no code implementations25 Dec 2018 Lingchen Zhao, Qian Wang, Qin Zou, Yan Zhang, Yanjiao Chen

With powerful parallel computing GPUs and massive user data, neural-network-based deep learning can well exert its strong power in problem modeling and solving, and has archived great success in many applications such as image classification, speech recognition and machine translation etc.

Image Classification Machine Translation +3

Cannot find the paper you are looking for? You can Submit a new open access paper.