Alert button
Picture for Josephine Passananti

Josephine Passananti

Alert button

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?

Add code
Bookmark button
Alert button
Feb 06, 2024
Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao

Viaarxiv icon

Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models

Add code
Bookmark button
Alert button
Oct 20, 2023
Shawn Shan, Wenxin Ding, Josephine Passananti, Haitao Zheng, Ben Y. Zhao

Figure 1 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 2 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 3 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Figure 4 for Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Viaarxiv icon

Natural Backdoor Datasets

Add code
Bookmark button
Alert button
Jun 21, 2022
Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao

Figure 1 for Natural Backdoor Datasets
Figure 2 for Natural Backdoor Datasets
Figure 3 for Natural Backdoor Datasets
Figure 4 for Natural Backdoor Datasets
Viaarxiv icon

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

Add code
Bookmark button
Alert button
Feb 11, 2022
Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao

Figure 1 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 2 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 3 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 4 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Viaarxiv icon

Backdoor Attacks on Facial Recognition in the Physical World

Add code
Bookmark button
Alert button
Jun 25, 2020
Emily Wenger, Josephine Passananti, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao

Figure 1 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 2 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 3 for Backdoor Attacks on Facial Recognition in the Physical World
Figure 4 for Backdoor Attacks on Facial Recognition in the Physical World
Viaarxiv icon