Alert button
Picture for Kui Ren

Kui Ren

Alert button

SoK: Gradient Leakage in Federated Learning

Add code
Bookmark button
Alert button
Apr 08, 2024
Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Zhenqiang Gong, Kui Ren

Viaarxiv icon

Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection

Add code
Bookmark button
Alert button
Mar 04, 2024
Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren

Figure 1 for Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection
Figure 2 for Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection
Figure 3 for Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection
Figure 4 for Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection
Viaarxiv icon

FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution

Add code
Bookmark button
Alert button
Feb 06, 2024
Qi Zhou, Dongxia Wang, Tianlin Li, Zhihong Xu, Yang Liu, Kui Ren, Wenhai Wang, Qing Guo

Viaarxiv icon

Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege

Add code
Bookmark button
Alert button
Jan 28, 2024
Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Yang Wang, Kui Ren

Viaarxiv icon

LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation

Add code
Bookmark button
Alert button
Jan 16, 2024
Zhixuan Chu, Yan Wang, Qing Cui, Longfei Li, Wenqing Chen, Sheng Li, Zhan Qin, Kui Ren

Viaarxiv icon

Certified Minimax Unlearning with Generalization Rates and Deletion Capacity

Add code
Bookmark button
Alert button
Dec 16, 2023
Jiaqi Liu, Jian Lou, Zhan Qin, Kui Ren

Viaarxiv icon

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning

Add code
Bookmark button
Alert button
Oct 20, 2023
Xinyu Zhang, Qingyu Liu, Zhongjie Ba, Yuan Hong, Tianhang Zheng, Feng Lin, Li Lu, Kui Ren

Figure 1 for FLTracer: Accurate Poisoning Attack Provenance in Federated Learning
Figure 2 for FLTracer: Accurate Poisoning Attack Provenance in Federated Learning
Figure 3 for FLTracer: Accurate Poisoning Attack Provenance in Federated Learning
Figure 4 for FLTracer: Accurate Poisoning Attack Provenance in Federated Learning
Viaarxiv icon

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution

Add code
Bookmark button
Alert button
Sep 25, 2023
Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren

Figure 1 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 2 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 3 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 4 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Viaarxiv icon

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection

Add code
Bookmark button
Alert button
Sep 20, 2023
Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren

Figure 1 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 2 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 3 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 4 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Viaarxiv icon

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues

Add code
Bookmark button
Alert button
Sep 18, 2023
Kun Pan, Yin Yifang, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, ZhiBo Wang, Lorenzo Cavallaro, Kui Ren

Figure 1 for DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues
Figure 2 for DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues
Figure 3 for DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues
Figure 4 for DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues
Viaarxiv icon