FAWA: Fast adversarial watermark attack H Jiang, J Yang, G Hua, L Li, Y Wang, S Tu, S Xia IEEE Transactions on Computers 73 (2), 301-313, 2021 | 22 | 2021 |
Mitigating the Curse of Dimensionality for Certified Robustness via Dual Randomized Smoothing S Xia, Y Yi, X Jiang, H Ding ICLR 2024, 2024 | 8 | 2024 |
Safeguarding medical image segmentation datasets against unauthorized training via contour-and texture-aware perturbations X Lin, Y Yu, S Xia, J Jiang, H Wang, Z Yu, Y Liu, Y Fu, S Wang, W Tang, ... arXiv preprint arXiv:2403.14250, 2024 | 8 | 2024 |
Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders Y Yu, Y Wang, S Xia, W Yang, S Lu, YP Tan, AC Kot ICML 2024, 2024 | 7 | 2024 |
Transferable Adversarial Attacks on SAM and Its Downstream Models S Xia, W Yang, Y Yu, X Lin, H Ding, L Duan, X Jiang Neurips 2024, 2024 | 1 | 2024 |
Backdoor Attacks against No-Reference Image Quality Assessment Models via A Scalable Trigger Y Yu, S Xia, X Lin, W Yang, S Lu, Y Tan, A Kot AAAI 2025, 2024 | | 2024 |