Zhengyu Zhao

Papers in Database (6)

attack arXiv Aug 9, 2025 · Aug 2025

Adversarial Video Promotion Against Text-to-Video Retrieval

Qiwei Tian, Chenhao Lin, Zhengyu Zhao et al. · Xi’an Jiaotong University

Adversarial video perturbation attack that promotes video rankings in text-to-video retrieval across white/grey/black-box settings

Input Manipulation Attack visionmultimodal
PDF Code
defense arXiv Apr 13, 2026 · 5w ago

Finetune Like You Pretrain: Boosting Zero-shot Adversarial Robustness in Vision-language Models

Songlong Xing, Weijie Wang, Zhengyu Zhao et al. · University of Trento · Fondazione Bruno Kessler +2 more

Adversarial finetuning for CLIP using web image-text pairs and contrastive learning to boost robustness across 14 domains

Input Manipulation Attack visionnlpmultimodal
PDF Code
attack arXiv Apr 17, 2026 · 4w ago

PoInit-of-View: Poisoning Initialization of Views Transfers Across Multiple 3D Reconstruction Systems

Weijie Wang, Songlong Xing, Zhengyu Zhao et al. · University of Trento · Fondazione Bruno Kessler +1 more

Adversarial attack poisoning input views to corrupt 3D reconstruction by targeting structure-from-motion initialization via cross-view gradient inconsistencies

Input Manipulation Attack vision
PDF
benchmark arXiv Aug 1, 2025 · Aug 2025

Revisiting Adversarial Patch Defenses on Object Detectors: Unified Evaluation, Large-Scale Dataset, and New Insights

Junhao Zheng, Jiahao Sun, Chenhao Lin et al. · Xi’an Jiaotong University · City University of Hong Kong +1 more

First unified benchmark evaluating 11 patch defenses against 13 adversarial patch attacks on object detectors with 94K-image dataset

Input Manipulation Attack vision
PDF Code
defense arXiv Aug 1, 2025 · Aug 2025

D3: Training-Free AI-Generated Video Detection Using Second-Order Features

Chende Zheng, Ruiqi suo, Chenhao Lin et al. · Xi’an Jiaotong University · Ltd. +1 more

Training-free AI-generated video detector exploiting second-order temporal feature divergence between real and synthetic videos

Output Integrity Attack visiongenerative
PDF Code
benchmark arXiv Apr 17, 2026 · 4w ago

TwoHamsters: Benchmarking Multi-Concept Compositional Unsafety in Text-to-Image Models

Chaoshuo Zhang, Yibo Liang, Mengke Tian et al. · Xi’an Jiaotong University · CISPA Helmholtz Center for Information Security

Benchmark evaluating compositional safety vulnerabilities in text-to-image models when benign concepts combine to create unsafe outputs

Input Manipulation Attack visiongenerative
PDF