default search action
Zhengyu Zhao 0001
Person information
- affiliation: Xi'an Jiaotong University, China
- affiliation (former): CISPA Helmholtz Center for Information Security, Germany
- affiliation (former): Radboud University, Nijmegen, The Netherlands
- affiliation (former): Tianjin University, Tianjin, China
- unicode name: 赵正宇
Other persons with the same name
- Zhengyu Zhao 0002 — Wuhan University, Wuhan, Hubei, China
- Zhengyu Zhao 0003 — Harbin Institute of Technology, Harbin, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Yulong Yang, Chenhao Lin, Qian Li, Zhengyu Zhao, Haoran Fan, Dawei Zhou, Nannan Wang, Tongliang Liu, Chao Shen:
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization. IEEE Trans. Inf. Forensics Secur. 19: 3265-3278 (2024) - [j5]Yulong Yang, Haoran Fan, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen:
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code. IEEE Trans. Inf. Forensics Secur. 19: 5880-5894 (2024) - [j4]Chenhao Lin, Fangbin Yi, Hang Wang, Jingyi Deng, Zhengyu Zhao, Qian Li, Chao Shen:
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 19: 8832-8844 (2024) - [c25]Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen:
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. CVPR 2024: 24452-24461 - [c24]Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Qian Li, Chao Shen:
Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval. ICML 2024 - [c23]Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Composite Backdoor Attacks Against Large Language Models. NAACL-HLT (Findings) 2024: 1459-1472 - [i27]Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen:
Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. CoRR abs/2403.17301 (2024) - [i26]Chen Ma, Ningfei Wang, Zhengyu Zhao, Qian Wang, Qi Alfred Chen, Chao Shen:
ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving. CoRR abs/2406.05810 (2024) - [i25]Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang:
Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study. CoRR abs/2407.09295 (2024) - [i24]Jingyi Deng, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Wang, Chao Shen:
A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication. CoRR abs/2407.10575 (2024) - [i23]Weipeng Jiang, Zhenting Wang, Juan Zhai, Shiqing Ma, Zhengyu Zhao, Chao Shen:
Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer. CoRR abs/2408.11313 (2024) - [i22]Hamid Bostani, Zhengyu Zhao, Veelasha Moonsamy:
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations. CoRR abs/2408.16025 (2024) - 2023
- [j3]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson:
Adversarial Image Color Transformations in Explicit Color Filter Space. IEEE Trans. Inf. Forensics Secur. 18: 3185-3197 (2023) - [c22]Rui Wen, Zhengyu Zhao, Zhuoran Liu, Michael Backes, Tianhao Wang, Yang Zhang:
Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning? ICLR 2023 - [c21]Zhuoran Liu, Zhengyu Zhao, Martha A. Larson:
Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression. ICML 2023: 22473-22487 - [c20]Zhengyu Zhao, Nga Dang, Martha A. Larson:
The Importance of Image Interpretation: Patterns of Semantic Misclassification in Real-World Adversarial Images. MMM (2) 2023: 718-725 - [i21]Zhuoran Liu, Zhengyu Zhao, Martha A. Larson:
Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression. CoRR abs/2301.13838 (2023) - [i20]Yihan Ma, Zhengyu Zhao, Xinlei He, Zheng Li, Michael Backes, Yang Zhang:
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis. CoRR abs/2306.07754 (2023) - [i19]Yugeng Liu, Tianshuo Cong, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models. CoRR abs/2308.07847 (2023) - [i18]Weijie Wang, Zhengyu Zhao, Nicu Sebe, Bruno Lepri:
Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection. CoRR abs/2309.01104 (2023) - [i17]Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Prompt Backdoors in Visual Prompt Learning. CoRR abs/2310.07632 (2023) - [i16]Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Composite Backdoor Attacks Against Large Language Models. CoRR abs/2310.07676 (2023) - [i15]Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Chao Shen:
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights. CoRR abs/2310.11850 (2023) - [i14]Qiwei Tian, Chenhao Lin, Qian Li, Zhengyu Zhao, Chao Shen:
Collapse-Oriented Adversarial Training with Triplet Decoupling for Robust Image Retrieval. CoRR abs/2312.07364 (2023) - 2022
- [c19]Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang:
Membership Inference Attacks by Exploiting Loss Trajectory. CCS 2022: 2085-2098 - [i13]Hamid Bostani, Zhuoran Liu, Zhengyu Zhao, Veelasha Moonsamy:
Domain Constraints in Feature Space: Strengthening Robustness of Android Malware Detection against Realizable Adversarial Examples. CoRR abs/2205.15128 (2022) - [i12]Zhengyu Zhao, Nga Dang, Martha A. Larson:
Evaluating Transfer-based Targeted Adversarial Perturbations against Real-World Computer Vision Systems based on Human Judgments. CoRR abs/2206.01467 (2022) - [i11]Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang:
Membership Inference Attacks by Exploiting Loss Trajectory. CoRR abs/2208.14933 (2022) - [i10]Dirren van Vlijmen, Alex Kolmus, Zhuoran Liu, Zhengyu Zhao, Martha A. Larson:
Generative Poisoning Using Random Discriminators. CoRR abs/2211.01086 (2022) - [i9]Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes:
Towards Good Practices in Evaluating Transfer Adversarial Attacks. CoRR abs/2211.09565 (2022) - 2021
- [c18]Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. NDSS 2021 - [c17]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson:
On Success and Simplicity: A Second Look at Transferable Targeted Attacks. NeurIPS 2021: 6115-6128 - [c16]Zhuoran Liu, Zhengyu Zhao, Martha A. Larson:
Pivoting Image-based Profiles Toward Privacy: Inhibiting Malicious Profiling with Adversarial Additions. UMAP 2021: 267-273 - [i8]Zhuoran Liu, Zhengyu Zhao, Alex Kolmus, Tijn Berns, Twan van Laarhoven, Tom Heskes, Martha A. Larson:
Going Grayscale: The Road to Understanding and Improving Unlearnable Examples. CoRR abs/2111.13244 (2021) - 2020
- [c15]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson:
Adversarial Color Enhancement: Generating Unrestricted Adversarial Images by Optimizing a Color Filter. BMVC 2020 - [c14]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson:
Towards Large Yet Imperceptible Adversarial Image Perturbations With Perceptual Color Distance. CVPR 2020: 1036-1045 - [c13]Zhengyu Zhao:
Fooling Blind Image Quality Assessment by Optimizing a Human-Understandable Color Filter. MediaEval 2020 - [c12]Zhuoran Liu, Zhengyu Zhao, Martha A. Larson, Laurent Amsaleg:
Pixel Privacy: Quality Camouflage for Social Images. MediaEval 2020 - [i7]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson:
A Differentiable Color Filter for Generating Unrestricted Adversarial Images. CoRR abs/2002.01008 (2020) - [i6]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson:
Adversarial Robustness Against Image Color Transformation within Parametric Filter Space. CoRR abs/2011.06690 (2020) - [i5]Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. CoRR abs/2011.09877 (2020) - [i4]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson:
On Success and Simplicity: A Second Look at Transferable Targeted Attacks. CoRR abs/2012.11207 (2020)
2010 – 2019
- 2019
- [j2]Anan Liu, Zhengyu Zhao, Chengqian Zhang, Yuting Su:
Smooth filtering identification based on convolutional neural networks. Multim. Tools Appl. 78(19): 26851-26865 (2019) - [c11]Benjamin Bischke, Patrick Helber, Simon Brugman, Erkan Basar, Zhengyu Zhao, Martha A. Larson, Konstantin Pogorelov:
The Multimedia Satellite Task at MediaEval 2019. MediaEval 2019 - [c10]Zhuoran Liu, Zhengyu Zhao:
Adversarial Photo Frame: Concealing Sensitive Scene Information of Social Images in a User-Acceptable Manner. MediaEval 2019 - [c9]Zhuoran Liu, Zhengyu Zhao, Martha A. Larson:
Pixel Privacy 2019: Protecting Sensitive Scene Information in Images. MediaEval 2019 - [c8]Zhuoran Liu, Zhengyu Zhao, Martha A. Larson:
Who's Afraid of Adversarial Queries?: The Impact of Image Modifications on Content-based Image Retrieval. ICMR 2019: 306-314 - [c7]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson, Ahmet Iscen, Naoko Nitta:
Reproducible Experiments on Adaptive Discriminative Region Discovery for Scene Recognition. ACM Multimedia 2019: 1076-1079 - [i3]Zhuoran Liu, Zhengyu Zhao, Martha A. Larson:
Who's Afraid of Adversarial Queries? The Impact of Image Modifications on Content-based Image Retrieval. CoRR abs/1901.10332 (2019) - [i2]Zhengyu Zhao, Zhuoran Liu, Martha A. Larson:
Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance. CoRR abs/1911.02466 (2019) - 2018
- [c6]Benjamin Bischke, Patrick Helber, Zhengyu Zhao, Jens de Bruijn, Damian Borth:
The Multimedia Satellite Task at MediaEval 2018. MediaEval 2018 - [c5]Martha A. Larson, Zhuoran Liu, Simon Brugman, Zhengyu Zhao:
Pixel Privacy: Increasing Image Appeal while Blocking Automatic Inference of Sensitive Scene Information. MediaEval 2018 - [c4]Zhuoran Liu, Zhengyu Zhao:
First Steps in Pixel Privacy: Exploring Deep Learning-based Image Enhancement against Large-Scale Image Inference. MediaEval 2018 - [c3]Zhengyu Zhao, Martha A. Larson, Nelleke Oostdijk:
Exploiting Local Semantic Concepts for Flooding-related Social Image Classification. MediaEval 2018 - [c2]Zhengyu Zhao, Martha A. Larson:
From Volcano to Toyshop: Adaptive Discriminative Region Discovery for Scene Recognition. ACM Multimedia 2018: 1760-1768 - [i1]Zhengyu Zhao, Martha A. Larson:
From Volcano to Toyshop: Adaptive Discriminative Region Discovery for Scene Recognition. CoRR abs/1807.08624 (2018) - 2017
- [j1]Anan Liu, Zhengyu Zhao, Chengqian Zhang, Yuting Su:
Median filtering forensics in digital images based on frequency-domain features. Multim. Tools Appl. 76(21): 22119-22132 (2017) - [c1]Zhengyu Zhao, Martha A. Larson:
Retrieving Social Flooding Images Based on Multimodal Information. MediaEval 2017
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint