Renyang Liu

Orcid: 0000-0002-7121-1257

Affiliations:
  • National University of Singapore, College of Computing and Data Science, Singapore
  • Yunnan University, School of Information Science and Engineering, Kunming, China


According to our database1, Renyang Liu authored at least 25 papers between 2021 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MBA: Multimodal Bidirectional Attack for Referring Expression Segmentation Models.
CoRR, June, 2025

IPAttack: imperceptible adversarial patch to attack object detectors.
Appl. Intell., April, 2025

Post-Deployment Fine-Tunable Semantic Communication.
IEEE Trans. Wirel. Commun., January, 2025

STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-Box Scenario.
IEEE Trans. Multim., 2025

Micro_NesT: multi-scale attention enhanced micro-expression recognition framework.
Expert Syst. Appl., 2025

Pseudo-label attention-based multiple instance learning for whole slide image classification.
Eng. Appl. Artif. Intell., 2025

2024
DTA: distribution transform-based attack for query-limited scenario.
Cybersecur., December, 2024

Exploiting Type I Adversarial Examples to Hide Data Information: A New Privacy-Preserving Approach.
IEEE Trans. Emerg. Top. Comput. Intell., June, 2024

Can LSH (locality-sensitive hashing) be replaced by neural network?
Soft Comput., January, 2024

Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models.
IEEE Trans. Inf. Forensics Secur., 2024

CNFA: Conditional Normalizing Flow for Query-Limited Attack.
Proceedings of the IEEE International Conference on Acoustics, 2024

SSTA: Salient Spatially Transformed Attack.
Proceedings of the IEEE International Conference on Acoustics, 2024

Fine-Tunable Semantic Communication for Image Transmission.
Proceedings of the 10th International Conference on Big Data Computing and Communications, 2024

2023
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model.
Frontiers Neurorobotics, June, 2023

Type-I Generative Adversarial Attack.
IEEE Trans. Dependable Secur. Comput., 2023

SSTA: Salient Spatially Transformed Attack.
CoRR, 2023

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding.
CoRR, 2023

Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks.
Proceedings of the Security and Privacy in Communication Networks, 2023

SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

DeepLSH: A Deep Learning-based Locality Sensitive Hash Method.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

Rewriting-Stego: Generating Natural and Controllable Steganographic Text with Pre-trained Language Model.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
SMDAF: A novel keypoint based method for copy-move forgery detection.
IET Image Process., 2022

RIA: A Reversible Network-based Imperceptible Adversarial Attack.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
EnsembleFool: A method to generate adversarial examples based on model fusion strategy.
Comput. Secur., 2021


  Loading...