Transferable adversarial attacks for image and video object detection X Wei, S Liang, N Chen, X Cao arXiv preprint arXiv:1811.12641, 2018 | 276 | 2018 |
Efficient adversarial attacks for visual object tracking S Liang, X Wei, S Yao, X Cao Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020 | 98 | 2020 |
{X-Adv}: Physical adversarial object attacks against x-ray prohibited item detection A Liu, J Guo, J Wang, S Liang, R Tao, W Zhou, C Liu, X Liu, D Tao 32nd USENIX Security Symposium (USENIX Security 23), 3781-3798, 2023 | 75 | 2023 |
Parallel rectangle flip attack: A query-based black-box attack against object detection S Liang, B Wu, Y Fan, X Wei, X Cao arXiv preprint arXiv:2201.08970, 2022 | 69 | 2022 |
BadCLIP: Dual-embedding guided backdoor attack on multimodal contrastive learning S Liang, M Zhu, A Liu, B Wu, X Cao, EC Chang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024 | 47 | 2024 |
Exploring the relationship between architectural design and adversarially robust generalization A Liu, S Tang, S Liang, R Gong, B Wu, X Liu, D Tao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 41* | 2023 |
A large-scale multiple-objective method for black-box attack against object detection S Liang, L Li, Y Fan, X Jia, J Li, B Wu, X Cao European Conference on Computer Vision, 619-636, 2022 | 40 | 2022 |
Generating transferable 3d adversarial point cloud via random perturbation factorization B He, J Liu, Y Li, S Liang, J Li, X Jia, X Cao Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 764-772, 2023 | 39 | 2023 |
Vl-trojan: Multimodal instruction backdoor attacks against autoregressive visual language models J Liang, S Liang, M Luo, A Liu, D Han, EC Chang, X Cao arXiv preprint arXiv:2402.13851, 2024 | 31 | 2024 |
Imitated detectors: Stealing knowledge of black-box object detectors S Liang, A Liu, J Liang, L Li, Y Bai, X Cao Proceedings of the 30th ACM International Conference on Multimedia, 4839-4847, 2022 | 29 | 2022 |
Sa-attack: Improving adversarial transferability of vision-language pre-training models via self-augmentation B He, X Jia, S Liang, T Lou, Y Liu, X Cao arXiv preprint arXiv:2312.04913, 2023 | 27 | 2023 |
Poisoned forgery face: Towards backdoor attacks on face forgery detection J Liang, S Liang, A Liu, X Jia, J Kuang, X Cao arXiv preprint arXiv:2402.11473, 2024 | 24 | 2024 |
Less is more: Fewer interpretable region via submodular subset selection R Chen, H Zhang, S Liang, J Li, X Cao arXiv preprint arXiv:2402.09164, 2024 | 23 | 2024 |
Generate more imperceptible adversarial examples for object detection S Liang, X Wei, X Cao ICML 2021 Workshop on Adversarial Machine Learning, 2021 | 23 | 2021 |
Improving robust fariness via balance adversarial training C Sun, C Xu, C Yao, S Liang, Y Wu, D Liang, X Liu, A Liu Proceedings of the AAAI Conference on Artificial Intelligence 37 (12), 15161 …, 2023 | 22 | 2023 |
Pre-trained trojan attacks for visual recognition A Liu, X Liu, X Zhang, Y Xiao, Y Zhou, S Liang, J Wang, X Cao, D Tao International Journal of Computer Vision, 1-18, 2025 | 20 | 2025 |
Diversifying the High-level Features for better Adversarial Transferability Z Wang, Z Zhang, S Liang, X Wang arXiv preprint arXiv:2304.10136, 2023 | 19 | 2023 |
Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt Z Ying, A Liu, T Zhang, Z Yu, S Liang, X Liu, D Tao arXiv preprint arXiv:2406.04031, 2024 | 17 | 2024 |
Does few-shot learning suffer from backdoor attacks? X Liu, X Jia, J Gu, Y Xun, S Liang, X Cao Proceedings of the AAAI Conference on Artificial Intelligence 38 (18), 19893 …, 2024 | 17 | 2024 |
Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs X Li, S Liang, J Zhang, H Fang, A Liu, EC Chang arXiv preprint arXiv:2402.14872, 2024 | 17 | 2024 |