Anti-dreambooth: Protecting users from personalized text-to-image synthesis
Text-to-image diffusion models are nothing but a revolution, allowing anyone, even without
design skills, to create realistic images from simple text inputs. With powerful personalization …
design skills, to create realistic images from simple text inputs. With powerful personalization …
Privacy-preserving explainable AI: a survey
As the adoption of explainable AI (XAI) continues to expand, the urgency to address its
privacy implications intensifies. Despite a growing corpus of research in AI privacy and …
privacy implications intensifies. Despite a growing corpus of research in AI privacy and …
Downstream-agnostic adversarial examples
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an
encoder which can be used as a general-purpose feature extractor, such that downstream …
encoder which can be used as a general-purpose feature extractor, such that downstream …
Advclip: Downstream-agnostic adversarial examples in multimodal contrastive learning
Multimodal contrastive learning aims to train a general-purpose feature extractor, such as
CLIP, on vast amounts of raw, unlabeled paired image-text data. This can greatly benefit …
CLIP, on vast amounts of raw, unlabeled paired image-text data. This can greatly benefit …
Self-supervised vision transformer-based few-shot learning for facial expression recognition
X Chen, X Zheng, K Sun, W Liu, Y Zhang - Information Sciences, 2023 - Elsevier
Facial expression recognition (FER) is embedded in many real-world human-computer
interaction tasks, such as online learning, depression recognition and remote diagnosis …
interaction tasks, such as online learning, depression recognition and remote diagnosis …
Securely fine-tuning pre-trained encoders against adversarial examples
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a
predominant solution within the deep learning landscape. Model providers furnish pre …
predominant solution within the deep learning landscape. Model providers furnish pre …
Clip2protect: Protecting facial privacy using text-guided makeup via adversarial latent search
The success of deep learning based face recognition systems has given rise to serious
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …
Transferable adversarial facial images for privacy protection
The success of deep face recognition (FR) systems has raised serious privacy concerns due
to their ability to enable unauthorized tracking of users in the digital world. Previous studies …
to their ability to enable unauthorized tracking of users in the digital world. Previous studies …
StyLess: boosting the transferability of adversarial examples
Adversarial attacks can mislead deep neural networks (DNNs) by adding imperceptible
perturbations to benign examples. The attack transferability enables adversarial examples to …
perturbations to benign examples. The attack transferability enables adversarial examples to …
BRPPNet: Balanced privacy protection network for referring personal image privacy protection
Traditional personal image privacy protection usually suffers from the overprotection
problem, where one or more undesired persons in an image may be inevitably shielded …
problem, where one or more undesired persons in an image may be inevitably shielded …