Follow
Zhengyu Zhao
Zhengyu Zhao
Postdoc, CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance
Z Zhao, Z Liu, M Larson
IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2020
922020
Who's Afraid of Adversarial Queries? The Impact of Image Modifications on Content-based Image Retrieval
Z Liu, Z Zhao, M Larson
ACM International Conference on Multimedia Retrieval (ICMR), 2019
352019
Multimedia Satellite Task: Emergency Response for Flooding Events based on Social and Satellite Images
B Bischke, P Helber, Z Zhao, J De Bruijn, D Borth
Multimedia Evaluation Benchmark Workshop (MediaEval), 2018
35*2018
Median Filtering Forensics in Digital Images Based on Frequency-Domain Features
A Liu, Z Zhao, C Zhang, Y Su
Multimedia Tools and Applications, 2017
322017
From volcano to toyshop: Adaptive discriminative region discovery for scene recognition
Z Zhao, M Larson
ACM international conference on Multimedia (ACM MM), 2018
29*2018
Pixel Privacy Task: Protecting Privacy in Social Images against Automatic Inference
Z Liu, Z Zhao, S Brugman, L Amsaleg, M Larson
Multimedia Evaluation Benchmark Workshop (MediaEval), 2018
27*2018
Smooth filtering identification based on convolutional neural networks
A Liu, Z Zhao, C Zhang, Y Su
Multimedia Tools and Applications, 2017
262017
On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Z Zhao, Z Liu, M Larson
Advances in Neural Information Processing Systems (NeurIPS), 2021
252021
Adversarial Image Color Transformations in Explicit Color Filter Space
Z Zhao, Z Liu, M Larson
In submission. Preliminary version at British Machine Vision Conference (BMVC), 2020
23*2020
RU Team@Multimedia Satellite Task: Retrieving Social Flooding Images Based on Multimodal Information.
Z Zhao, M Larson
Multimedia Evaluation Benchmark Workshop (MediaEval), 2017
22*2017
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel
Z Liu, N Samwel, L Weissbart, Z Zhao, D Lauret, L Batina, M Larson
Network and Distributed System Security Symposium (NDSS), 2021
82021
RU Team@Pixel Privacy Task: Adversarial Examples for Protecting Image Privacy
Z Liu, Z Zhao
Multimedia Evaluation Benchmark Workshop (MediaEval), 2018
8*2018
Membership Inference Attacks by Exploiting Loss Trajectory
Y Liu, Z Zhao, M Backes, Y Zhang
ACM Conference on Computer and Communications Security (CCS), 2022
32022
Going Grayscale: The Road to Understanding and Improving Unlearnable Examples
Z Liu, Z Zhao, A Kolmus, T Berns, T van Laarhoven, T Heskes, M Larson
arXiv preprint arXiv:2111.13244, 2021
22021
Towards Good Practices in Evaluating Transfer Adversarial Attacks
Z Zhao, H Zhang, R Li, R Sicre, L Amsaleg, M Backes
arXiv preprint arXiv:2211.09565, 2022
2022
Generative Poisoning Using Random Discriminators
D van Vlijmen, A Kolmus, Z Liu, Z Zhao, M Larson
ECCV Workshop on Responsible Computer Vision (RCV), 2022
2022
Pivoting Image-based Profiles Toward Privacy: Inhibiting Malicious Profiling with Adversarial Additions
Z Liu, Z Zhao, M Larson
ACM Conference on User Modeling, Adaptation and Personalization (UMAP), 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–17