Alert button
Picture for Xinqiao Zhang

Xinqiao Zhang

Alert button

FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs

Add code
Bookmark button
Alert button
Sep 26, 2022
Shehzeen Hussain, Nojan Sheybani, Paarth Neekhara, Xinqiao Zhang, Javier Duarte, Farinaz Koushanfar

Figure 1 for FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs
Figure 2 for FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs
Figure 3 for FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs
Figure 4 for FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs
Viaarxiv icon

zPROBE: Zero Peek Robustness Checks for Federated Learning

Add code
Bookmark button
Alert button
Jun 24, 2022
Zahra Ghodsi, Mojan Javaheripi, Nojan Sheybani, Xinqiao Zhang, Ke Huang, Farinaz Koushanfar

Figure 1 for zPROBE: Zero Peek Robustness Checks for Federated Learning
Figure 2 for zPROBE: Zero Peek Robustness Checks for Federated Learning
Figure 3 for zPROBE: Zero Peek Robustness Checks for Federated Learning
Figure 4 for zPROBE: Zero Peek Robustness Checks for Federated Learning
Viaarxiv icon

AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection

Add code
Bookmark button
Alert button
Apr 12, 2022
Huili Chen, Xinqiao Zhang, Ke Huang, Farinaz Koushanfar

Figure 1 for AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
Figure 2 for AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
Figure 3 for AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
Figure 4 for AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
Viaarxiv icon

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

Add code
Bookmark button
Alert button
Apr 08, 2022
Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar

Figure 1 for An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Figure 2 for An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Figure 3 for An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Figure 4 for An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Viaarxiv icon

FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes

Add code
Bookmark button
Alert button
Apr 05, 2022
Paarth Neekhara, Shehzeen Hussain, Xinqiao Zhang, Ke Huang, Julian McAuley, Farinaz Koushanfar

Figure 1 for FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes
Figure 2 for FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes
Figure 3 for FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes
Figure 4 for FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes
Viaarxiv icon

TAD: Trigger Approximation based Black-box Trojan Detection for AI

Add code
Bookmark button
Alert button
Feb 24, 2021
Xinqiao Zhang, Huili Chen, Farinaz Koushanfar

Figure 1 for TAD: Trigger Approximation based Black-box Trojan Detection for AI
Figure 2 for TAD: Trigger Approximation based Black-box Trojan Detection for AI
Figure 3 for TAD: Trigger Approximation based Black-box Trojan Detection for AI
Figure 4 for TAD: Trigger Approximation based Black-box Trojan Detection for AI
Viaarxiv icon