Search Results for author: Ruinan Ma

Found 3 papers, 0 papers with code

Towards Transferable Adversarial Attacks with Centralized Perturbation

no code implementations11 Dec 2023 Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li

To this end, we propose a transferable adversarial attack with fine-grained perturbation optimization in the frequency domain, creating centralized perturbation.

Adversarial Attack

Unified High-binding Watermark for Unconditional Image Generation Models

no code implementations14 Oct 2023 Ruinan Ma, Yu-an Tan, Shangbo Wu, Tian Chen, Yajie Wang, Yuanzhang Li

In the first stage, we use an encoder to invisibly write the watermark image into the output images of the original AIGC tool, and reversely extract the watermark image through the corresponding decoder.

Decoder Image Generation +1

Concealed Electronic Countermeasures of Radar Signal with Adversarial Examples

no code implementations12 Oct 2023 Ruinan Ma, Canjie Zhu, Mingfeng Lu, Yunjie Li, Yu-an Tan, Ruibin Zhang, Ran Tao

We first propose an attack pipeline under the time-frequency images scenario and DITIMI-FGSM attack algorithm with high transferability.

Cannot find the paper you are looking for? You can Submit a new open access paper.