Alert button
Picture for Ben Y. Zhao

Ben Y. Zhao

Alert button

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?

Feb 06, 2024
Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao

Viaarxiv icon

Towards Scalable and Robust Model Versioning

Jan 17, 2024
Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng

Viaarxiv icon

Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models

Oct 20, 2023
Shawn Shan, Wenxin Ding, Josephine Passananti, Haitao Zheng, Ben Y. Zhao

Figure 1 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 2 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 3 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 4 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Viaarxiv icon

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker

Feb 21, 2023
Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Ben Y. Zhao, Haitao Zheng, Prateek Mittal

Figure 1 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 2 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 3 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Figure 4 for Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker
Viaarxiv icon

Data Isotopes for Data Provenance in DNNs

Aug 29, 2022
Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov

Figure 1 for Data Isotopes for Data Provenance in DNNs
Figure 2 for Data Isotopes for Data Provenance in DNNs
Figure 3 for Data Isotopes for Data Provenance in DNNs
Figure 4 for Data Isotopes for Data Provenance in DNNs
Viaarxiv icon

Natural Backdoor Datasets

Jun 21, 2022
Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao

Figure 1 for Natural Backdoor Datasets
Figure 2 for Natural Backdoor Datasets
Figure 3 for Natural Backdoor Datasets
Figure 4 for Natural Backdoor Datasets
Viaarxiv icon

Can Backdoor Attacks Survive Time-Varying Models?

Jun 08, 2022
Huiying Li, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng

Figure 1 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 2 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 3 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 4 for Can Backdoor Attacks Survive Time-Varying Models?
Viaarxiv icon

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

Feb 11, 2022
Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao

Figure 1 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 2 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 3 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 4 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Viaarxiv icon

SoK: Anti-Facial Recognition Technology

Dec 08, 2021
Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao

Figure 1 for SoK: Anti-Facial Recognition Technology
Figure 2 for SoK: Anti-Facial Recognition Technology
Figure 3 for SoK: Anti-Facial Recognition Technology
Figure 4 for SoK: Anti-Facial Recognition Technology
Viaarxiv icon