Anti-dreambooth: Protecting users from personalized text-to-image synthesis

T Van Le, H Phung, TH Nguyen… - Proceedings of the …, 2023 - openaccess.thecvf.com
Text-to-image diffusion models are nothing but a revolution, allowing anyone, even without
design skills, to create realistic images from simple text inputs. With powerful personalization …

Privacy-preserving explainable AI: a survey

TT Nguyen, TT Huynh, Z Ren, TT Nguyen… - Science China …, 2025 - Springer
As the adoption of explainable AI (XAI) continues to expand, the urgency to address its
privacy implications intensifies. Despite a growing corpus of research in AI privacy and …

Downstream-agnostic adversarial examples

Z Zhou, S Hu, R Zhao, Q Wang… - Proceedings of the …, 2023 - openaccess.thecvf.com
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an
encoder which can be used as a general-purpose feature extractor, such that downstream …

Advclip: Downstream-agnostic adversarial examples in multimodal contrastive learning

Z Zhou, S Hu, M Li, H Zhang, Y Zhang… - Proceedings of the 31st …, 2023 - dl.acm.org
Multimodal contrastive learning aims to train a general-purpose feature extractor, such as
CLIP, on vast amounts of raw, unlabeled paired image-text data. This can greatly benefit …

Self-supervised vision transformer-based few-shot learning for facial expression recognition

X Chen, X Zheng, K Sun, W Liu, Y Zhang - Information Sciences, 2023 - Elsevier
Facial expression recognition (FER) is embedded in many real-world human-computer
interaction tasks, such as online learning, depression recognition and remote diagnosis …

Securely fine-tuning pre-trained encoders against adversarial examples

Z Zhou, M Li, W Liu, S Hu, Y Zhang… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a
predominant solution within the deep learning landscape. Model providers furnish pre …

Clip2protect: Protecting facial privacy using text-guided makeup via adversarial latent search

F Shamshad, M Naseer… - Proceedings of the …, 2023 - openaccess.thecvf.com
The success of deep learning based face recognition systems has given rise to serious
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …

Transferable adversarial facial images for privacy protection

M Li, J Wang, H Zhang, Z Zhou, S Hu… - Proceedings of the 32nd …, 2024 - dl.acm.org
The success of deep face recognition (FR) systems has raised serious privacy concerns due
to their ability to enable unauthorized tracking of users in the digital world. Previous studies …

StyLess: boosting the transferability of adversarial examples

K Liang, B **ao - Proceedings of the IEEE/CVF Conference …, 2023 - openaccess.thecvf.com
Adversarial attacks can mislead deep neural networks (DNNs) by adding imperceptible
perturbations to benign examples. The attack transferability enables adversarial examples to …

BRPPNet: Balanced privacy protection network for referring personal image privacy protection

J Lin, X Dai, K Nai, J Yuan, Z Li, X Zhang, S Li - Expert Systems with …, 2023 - Elsevier
Traditional personal image privacy protection usually suffers from the overprotection
problem, where one or more undesired persons in an image may be inevitably shielded …