Follow
Peizhuo Lv
Title
Cited by
Cited by
Year
A robustness-assured white-box watermark in neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li
IEEE Transactions on Dependable and Secure Computing 20 (6), 5214-5229, 2023
32*2023
DBIA: Data-Free Backdoor Attack Against Transformer Networks
P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang
2023 IEEE International Conference on Multimedia and Expo (ICME), 2819-2824, 2023
20*2023
A data-free backdoor injection approach in neural networks
P Lv, C Yue, R Liang, Y Yang, S Zhang, H Ma, K Chen
32nd USENIX Security Symposium (USENIX Security 23), 2671-2688, 2023
162023
A survey of audiovisual deepfake detection techniques
R Liang, M Li, K Chen
Journal of Cyber Security 5 (2), 1-17, 2020
152020
Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain
C Yue, P Lv, R Liang, K Chen
ECAI 2023, 2954-2961, 2023
122023
MEA-Defender: A Robust Watermark against Model Extraction Attack
P Lv, H Ma, K Chen, J Zhou, S Zhang, R Liang, S Zhu, P Li, Y Zhang
arXiv preprint arXiv:2401.15239, 2024
72024
视听觉深度伪造检测技术研究综述
梁瑞刚, 吕培卓, 赵月, 陈鹏, 邢豪, 张颖君, 韩冀中, 赫然, 赵险峰, 李明, ...
信息安全学报 5 (2), 1-17, 2020
72020
Ssl-wm: A black-box watermarking approach for encoders pre-trained by self-supervised learning
P Lv, P Li, S Zhu, S Zhang, K Chen, R Liang, C Yue, F Xiang, Y Cai, H Ma, ...
arXiv preprint arXiv:2209.03563, 2022
62022
DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models
J Zhou, P Lv, Y Lan, G Meng, K Chen, H Ma
Proceedings of the AAAI Conference on Artificial Intelligence 38 (19), 21850 …, 2024
52024
Aliasing backdoor attacks on pre-trained models
Y Lee, K Chen, G Meng, P Lv
32nd USENIX Security Symposium (USENIX Security 23), 2707-2724, 2023
42023
Model stealing attack against multi-exit networks
L Pan, L Peizhuo, C Kai, C Yuling, X Fan, Z Shengzhi
arXiv preprint arXiv:2305.13584, 2023
12023
神经网络水印技术研究进展
张颖君, 陈恺, 周赓, 吕培卓, 刘勇, 黄亮
计算机研究与发展 58 (5), 964-976, 2021
12021
KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs
H Ma, P Lv, K Chen, J Zhou
Proceedings of the 27th International Symposium on Research in Attacks …, 2024
2024
PersonaMark: Personalized LLM watermarking for model protection and user attribution
Y Zhang, P Lv, Y Liu, Y Ma, W Lu, X Wang, X Liu, J Liu
arXiv preprint arXiv:2409.09739, 2024
2024
A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information
P Li, P Lv, S Zhu, R Liang, K Chen
arXiv preprint arXiv:2210.08956, 2022
2022
A survey of audiovisual deepfake detection techniques
R Liang, M Li, K Chen
Journal of Cyber Security 5 (2), 1-17, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–16