Picture for Ben Y. Zhao

Ben Y. Zhao

Disrupting Style Mimicry Attacks on Video Imagery

Add code
May 11, 2024
Viaarxiv icon

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?

Add code
Feb 06, 2024
Viaarxiv icon

Towards Scalable and Robust Model Versioning

Add code
Jan 17, 2024
Figure 1 for Towards Scalable and Robust Model Versioning
Figure 2 for Towards Scalable and Robust Model Versioning
Figure 3 for Towards Scalable and Robust Model Versioning
Figure 4 for Towards Scalable and Robust Model Versioning
Viaarxiv icon

Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models

Add code
Oct 20, 2023
Figure 1 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 2 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 3 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 4 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Viaarxiv icon

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker

Add code
Feb 21, 2023
Figure 1 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 2 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 3 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 4 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Viaarxiv icon

Data Isotopes for Data Provenance in DNNs

Add code
Aug 29, 2022
Figure 1 for Data Isotopes for Data Provenance in DNNs
Figure 2 for Data Isotopes for Data Provenance in DNNs
Figure 3 for Data Isotopes for Data Provenance in DNNs
Figure 4 for Data Isotopes for Data Provenance in DNNs
Viaarxiv icon

Natural Backdoor Datasets

Add code
Jun 21, 2022
Figure 1 for Natural Backdoor Datasets
Figure 2 for Natural Backdoor Datasets
Figure 3 for Natural Backdoor Datasets
Figure 4 for Natural Backdoor Datasets
Viaarxiv icon

Can Backdoor Attacks Survive Time-Varying Models?

Add code
Jun 08, 2022
Figure 1 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 2 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 3 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 4 for Can Backdoor Attacks Survive Time-Varying Models?
Viaarxiv icon

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

Add code
Feb 11, 2022
Figure 1 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 2 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 3 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 4 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Viaarxiv icon

SoK: Anti-Facial Recognition Technology

Add code
Dec 08, 2021
Figure 1 for SoK: Anti-Facial Recognition Technology
Figure 2 for SoK: Anti-Facial Recognition Technology
Figure 3 for SoK: Anti-Facial Recognition Technology
Figure 4 for SoK: Anti-Facial Recognition Technology
Viaarxiv icon