Search Results for author: Nan Zhong

Found 5 papers, 2 papers with code

Object-oriented backdoor attack against image captioning

no code implementations5 Jan 2024 Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, Sheng Li

After training with the poisoned data, the attacked model behaves normally on benign images, but for poisoned images, the model will generate some sentences irrelevant to the given image.

Backdoor Attack Image Captioning +2

Model Copyright Protection in Buyer-seller Environment

no code implementations5 Dec 2023 Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang

The main idea of ISNN is to make a DNN sensitive to the key and copyright information.

valid

PatchCraft: Exploring Texture Patch for Efficient AI-generated Image Detection

1 code implementation21 Nov 2023 Nan Zhong, Yiran Xu, Sheng Li, Zhenxing Qian, Xinpeng Zhang

We observe that the texture patches of images tend to reveal more traces left by generative models compared to the global semantic information of the images.

Image Forensics

Physical Invisible Backdoor Based on Camera Imaging

no code implementations14 Sep 2023 Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang

Subsequently, we elaborate a special network architecture, which is easily compromised by our backdoor attack, by leveraging the attributes of the CFA interpolation algorithm and combining it with the feature extraction block in the camera identification model.

Backdoor Attack

Imperceptible Backdoor Attack: From Input Space to Feature Representation

1 code implementation6 May 2022 Nan Zhong, Zhenxing Qian, Xinpeng Zhang

A U-net-based network is employed to generate concrete parameters of multinomial distribution for each benign input.

Backdoor Attack

Cannot find the paper you are looking for? You can Submit a new open access paper.