Search Results for author: Yuepeng Hu

Found 4 papers, 1 papers with code

Stable Signature is Unstable: Removing Image Watermark from Diffusion Models

no code implementations12 May 2024 Yuepeng Hu, Zhengyuan Jiang, Moyang Guo, Neil Gong

Our results show that our attack can effectively remove the watermark from a diffusion model such that its generated images are non-watermarked, while maintaining the visual quality of the generated images.

Watermark-based Detection and Attribution of AI-Generated Content

no code implementations5 Apr 2024 Zhengyuan Jiang, Moyang Guo, Yuepeng Hu, Neil Zhenqiang Gong

Several companies--such as Google, Microsoft, and OpenAI--have deployed techniques to watermark AI-generated content to enable proactive detection.

A Transfer Attack to Image Watermarks

no code implementations22 Mar 2024 Yuepeng Hu, Zhengyuan Jiang, Moyang Guo, Neil Gong

The robustness of such watermark-based detector against evasion attacks in the white-box and black-box settings is well understood in the literature.

PORE: Provably Robust Recommender Systems against Data Poisoning Attacks

1 code implementation26 Mar 2023 Jinyuan Jia, Yupei Liu, Yuepeng Hu, Neil Zhenqiang Gong

PORE can transform any existing recommender system to be provably robust against any untargeted data poisoning attacks, which aim to reduce the overall performance of a recommender system.

Data Poisoning Recommendation Systems

Cannot find the paper you are looking for? You can Submit a new open access paper.