Follow
Ziqi Zhou
Title
Cited by
Cited by
Year
Badhash: Invisible backdoor attacks against deep hashing with clean label
S Hu, Z Zhou, Y Zhang, LY Zhang, Y Zheng, Y He, H Jin
Proceedings of the 30th ACM International Conference on Multimedia (ACM MM …, 2022
312022
AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning
Z Zhou, S Hu, M Li, H Zhang, Y Zhang, H Jin
Proceedings of the 31st ACM International Conference on Multimedia (ACM MM 2023), 2023
242023
Downstream-agnostic Adversarial Examples
Z Zhou, S Hu, R Zhao, Q Wang, LY Zhang, J Hou, H Jin
Proceedings of the International Conference on Computer Vision (ICCV 2023), 2023
142023
Corrupting convolution-based unlearnable datasets with pixel-based image transformations
X Wang, S Hu, M Li, Z Yu, Z Zhou, LY Zhang, H Jin
arXiv preprint arXiv:2311.18403, 2023
42023
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness
H Zhang, S Hu, Y Wang, LY Zhang, Z Zhou, X Wang, Y Zhang, C Chen
Proceedings of the 33rd International Joint Conference on Artificial …, 2024
32024
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Z Zhou, M Li, W Liu, S Hu, Y Zhang, W Wan, L Xue, LY Zhang, D Yao, ...
Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P 2024), 2024
22024
Enhancing Generalization Robustness of Federated Learning in Highly Heterogeneous Environments
W Wan, S Hu, J Lu, M Li, Z Zhou, H Jin
SCIENTIA SINICA Informationis 54 (3), 566–581, 2024
2024
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
X Wang, S Hu, Y Zhang, Z Zhou, LY Zhang, P Xu, W Wan, H Jin
Proceedings of the 29th European Symposium on Research in Computer Security …, 0
Corrupting Unbounded Unlearnable Datasets with Pixel-based Image Transformations
X Wang, S Hu, M Li, Z Yu, Z Zhou, LY Zhang, H Jin
The system can't perform the operation now. Try again later.
Articles 1–9