no code implementations • 5 Jan 2024 • Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, Sheng Li
After training with the poisoned data, the attacked model behaves normally on benign images, but for poisoned images, the model will generate some sentences irrelevant to the given image.
no code implementations • 5 Dec 2023 • Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang
The main idea of ISNN is to make a DNN sensitive to the key and copyright information.
1 code implementation • 21 Nov 2023 • Nan Zhong, Yiran Xu, Sheng Li, Zhenxing Qian, Xinpeng Zhang
We observe that the texture patches of images tend to reveal more traces left by generative models compared to the global semantic information of the images.
no code implementations • 14 Sep 2023 • Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang
Subsequently, we elaborate a special network architecture, which is easily compromised by our backdoor attack, by leveraging the attributes of the CFA interpolation algorithm and combining it with the feature extraction block in the camera identification model.
1 code implementation • 6 May 2022 • Nan Zhong, Zhenxing Qian, Xinpeng Zhang
A U-net-based network is employed to generate concrete parameters of multinomial distribution for each benign input.