Qian Wang
Wuhan University
H-index: 60
Asia-China
Top articles of Qian Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Hijacking Attacks against Neural Networks by Analyzing Training Data | arXiv preprint arXiv:2401.09740 | Yunjie Ge Qian Wang Huayang Huang Qi Li Cong Wang | 2024/1/18 |
Towards benchmarking and evaluating deepfake detection | IEEE Transactions on Dependable and Secure Computing | Jingyi Deng Chenhao Lin Pengbin Hu Chao Shen Qian Wang | 2024/2/26 |
FastTextDodger: Decision-based Adversarial Attack against Black-box NLP Models with Extremely High Efficiency | IEEE Transactions on Information Forensics and Security | Xiaoxue Hu Geling Liu Baolin Zheng Lingchen Zhao Qian Wang | 2024/1/5 |
Revisiting Adversarial Robustness Distillation from the Perspective of Robust Fairness | Advances in Neural Information Processing Systems | Xinli Yue Mou Ningping Qian Wang Lingchen Zhao | 2024/2/13 |
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns | IEEE Transactions on Mobile Computing | Man Zhou Qian Wang Qi Li Wenyu Zhou Jingxiao Yang | 2024/2/1 |
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices | arXiv preprint arXiv:2403.15271 | Yue Xiao Yi He Xiaoli Zhang Qian Wang Renjie Xie | 2024/3/22 |
Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models | IEEE Transactions on Information Forensics and Security | Shenyi Zhang Baolin Zheng Peipei Jiang Lingchen Zhao Chao Shen | 2024/1/29 |
Revisiting Adversarial Training under Long-Tailed Distributions | arXiv preprint arXiv:2403.10073 | Xinli Yue Ningping Mou Qian Wang Lingchen Zhao | 2024/3/15 |
SwiftTheft: A Time-Efficient Model Extraction Attack Framework Against Cloud-Based Deep Neural Networks | Chinese Journal of Electronics | Wenbin Yang Xueluan Gong Yanjiao Chen Qian Wang Jianshuo Dong | 2024/1/22 |
Detecting adversarial faces using only real face self-perturbations | Qian Wang Yongqin Xian Hefei Ling Jinyuan Zhang Xiaorui Lin | 2023/8/19 | |
Adversarial network pruning by filter robustness estimation | Xinlu Zhuang Yunjie Ge Baolin Zheng Qian Wang | 2023/6/4 | |
Orion: Online backdoor sample detection via evolution deviance | International Joint Conference on Artificial Intelligence | Huayang Huang Qian Wang Xueluan Gong Tao Wang | 2023/8/19 |
Interpreting adversarial examples in deep learning: A review | Sicong Han Chenhao Lin Chao Shen Qian Wang Xiaohong Guan | 2023/7/17 | |
Kaleidoscope: Physical backdoor attacks against deep neural networks with RGB filters | IEEE Transactions on Dependable and Secure Computing | Xueluan Gong Ziyao Wang Yanjiao Chen Meng Xue Qian Wang | 2023/1/23 |
虚假数字人脸内容生成与检测技术 | 计算机学报 | 蔺琛皓, 沈超, 邓静怡, 胡鹏斌, 王骞, 马仕清, 李琦, 管晓宏 | 2023 |
Poster: Metadata-private Messaging without Coordination | Peipei Jiang Qian Wang Yihao Wu Cong Wang | 2023/11/15 | |
Redeem myself: Purifying backdoors in deep learning models using self attention distillation | Xueluan Gong Yanjiao Chen Wang Yang Qian Wang Yuzhe Gu | 2023/5/21 | |
Downstream-agnostic adversarial examples | ICCV 2023 | Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang | 2023/7/23 |
Toward full accounting for leakage exploitation and mitigation in dynamic encrypted databases | IEEE Transactions on Dependable and Secure Computing | Lei Xu Anxin Zhou Huayi Duan Cong Wang Qian Wang | 2023/7/17 |
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems | IEEE Communications Magazine | Yunjie Ge Qian Wang Jiayuan Yu Chao Shen Qi Li | 2023/3/27 |