Search Results for author: Chengfang Fang

Found 7 papers, 1 papers with code

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence

no code implementations ICCV 2023 Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang

In this paper, we take the role of investigators who want to trace the attack and identify the source, that is, the particular model which the adversarial examples are generated from.

Adversarial Attack

Mitigating Adversarial Attacks by Distributing Different Copies to Different Users

no code implementations30 Nov 2021 Jiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang

We point out that by distributing different copies of the model to different buyers, we can mitigate the attack such that adversarial samples found on one copy would not work on another copy.

Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack

no code implementations13 Apr 2021 Xinyi Zhang, Chengfang Fang, Jie Shi

We find the effectiveness of existing techniques significantly affected by the absence of pre-trained models.

Model extraction

A-FMI: Learning Attributions from Deep Networks via Feature Map Importance

no code implementations12 Apr 2021 An Zhang, Xiang Wang, Chengfang Fang, Jie Shi, Tat-Seng Chua, Zehua Chen

Gradient-based attribution methods can aid in the understanding of convolutional neural networks (CNNs).

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

no code implementations28 Sep 2020 Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi

This paper aims to provide a thorough study on the effectiveness of the transformation-based ensemble defence for image classification and its reasons.

Image Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.