Publications

My published papers and preprint.

2025

  1. APIN 2025
    IPAttack: imperceptible adversarial patch to attack object detectors
    Yongming Wen, Peiyuan Si, Wei Zhou, Zongheng Zhao, Chao Yi, and Renyang Liu*
    Applied Intelligence, 2025
  2. EAAI 2025
    Pseudo-label attention-based multiple instance learning for whole slide image classification
    Jing He, Ping Wang, Jingwen Cai, Dan Tang, Shaowen Yao, and Renyang Liu*
    Engineering Applications of Artificial Intelligence, 2025
  3. TMM 2025
    STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
    Renyang Liu, Kwok-Yan Lam, Wei Zhou, Sixing Wu, Jun Zhao, Dongting Hu, and Mingming Gong
    IEEE Transactions on Multimedia, 2025

2024

  1. TWC 2024
    Post-Deployment Fine-Tunable Semantic Communication
    Peiyuan Si, Renyang Liu, Liangxin Qian, Jun Zhao, and Kwok-Yan Lam
    IEEE Transactions on Wireless Communications, 2024
  2. ICASSP 2024
    SSTA: Salient Spatially Transformed Attack
    Renyang Liu, Wei Zhou, Sixing Wu, Jun Zhao, and Kwok-Yan Lam
    In ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024
  3. ICASSP 2024
    CNFA: Conditional Normalizing Flow for Query-Limited Attack
    Renyang Liu, Wei Zhou, Jinhong Zhang, Haoran Li, and Ruxin Wang
    In ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024
  4. TIFS 2024
    Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
    Renyang Liu, Wei Zhou, Tianwei Zhang, Kangjie Chen, Jun Zhao, and Kwok-Yan Lam
    IEEE Transactions on Information Forensics and Security, 2024
  5. CYSE 2024
    DTA: distribution transform-based attack for query-limited scenario
    Renyang Liu, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang, and Ruxin Wang
    Cybersecurity, 2024
  6. TETCI 2024
    Exploiting Type I Adversarial Examples to Hide Data Information: A New Privacy-Preserving Approach
    Song Gao, Xiaoxuan Wang, Bingbing Song, Renyang Liu, Shaowen Yao, Wei Zhou, and Shui Yu
    IEEE Transactions on Emerging Topics in Computational Intelligence, 2024
  7. SOCO 2024
    Can LSH (locality-sensitive hashing) be replaced by neural network?
    Renyang Liu, Jun Zhao, Xing Chu, Yu Liang, Wei Zhou, and Jing He
    Soft Computing, 2024

2023

  1. SecureCOMM 2023
    Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks
    Renyang Liu, Wei Zhou, Jinhong Zhang, Xiaoyuan Liu, Peiyuan Si, and Haoran Li
    In International Conference on Security and Privacy in Communication Systems, 2023
  2. ICONIP 2023
    SCME: A self-contrastive method for data-free and query-limited model extraction attack
    Renyang Liu, Jinhong Zhang, Kwok-Yan Lam, Jun Zhao, and Wei Zhou
    In International Conference on Neural Information Processing, 2023
  3. DASFFA 2023
    Rewriting-Stego: generating natural and controllable steganographic text with pre-trained language model
    Fanxiao Li, Sixing Wu, Jiong Yu, Shuoxin Wang, BingBing Song, Renyang Liu, Haoseng Lai, and 1 more author
    In International Conference on Database Systems for Advanced Applications, 2023
  4. ICICS 2023
    AFLOW: developing adversarial examples under extremely noise-limited settings
    Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, and Wei Zhou
    In International Conference on Information and Communications Security, 2023
  5. TDSC 2023
    Type-I generative adversarial attack
    Shenghong He, Ruxin Wang, Tongliang Liu, Chao Yi, Xin Jin, Renyang Liu, and Wei Zhou
    IEEE Transactions on Dependable and Secure Computing, 2023

2022

  1. IET-IP 2022
    SMDAF: A novel keypoint based method for copy-move forgery detection
    Guangyu Yue, Qing Duan, Renyang Liu, Wenyu Peng, Yun Liao, and Junhui Liu
    IET Image Processing, 2022
  2. ICTAI 2022
    RIA: A Reversible Network-based Imperceptible Adversarial Attack
    Fanxiao Li, Renyang Liu, Zhenli He, Song Gao, Yunyun Dong, and Wei Zhou
    In 2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI), 2022

2021

  1. COSE 2021
    EnsembleFool: A method to generate adversarial examples based on model fusion strategy
    Wenyu Peng, Renyang Liu, Ruxin Wang, Taining Cheng, Zifeng Wu, Li Cai, and Wei Zhou
    Computers & Security, 2021

Preprints

2024

  1. Arxiv
    D-Judge: How Far Are We? Evaluating the Discrepancies Between AI-synthesized Images and Natural Images through Multimodal Guidance
    Renyang Liu, Ziyu Lyu, Wei Zhou, and See-Kiong Ng
    ArXiv preprint arXiv:2412.17632, 2024