no code implementations • 5 Feb 2024 • Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao
We curate real human art across 7 styles, generate matching images from 5 generative models, and apply 8 detectors (5 automated detectors and 3 different human groups including 180 crowdworkers, 4000+ professional artists, and 13 expert artists experienced at detecting AI).
no code implementations • 20 Oct 2023 • Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao
In this paper, we show that poisoning attacks can be successful on generative models.
no code implementations • 8 Dec 2021 • Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
The rapid adoption of facial recognition (FR) technology by both government and commercial entities in recent years has raised concerns about civil liberties and privacy.
no code implementations • 13 Oct 2021 • Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao
We propose a novel iterative clustering and pruning solution that trims "innocent" training samples, until all that remains is the set of poisoned data responsible for the attack.
no code implementations • 8 Feb 2021 • Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao
We experimentally demonstrate that Dolos provides 94+% protection against state-of-the-art WF attacks under a variety of settings.
Website Fingerprinting Attacks Cryptography and Security
1 code implementation • 24 Jun 2020 • Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Hai-Tao Zheng, Ben Y. Zhao
In particular, query-based black-box attacks do not require knowledge of the deep learning model, but can compute adversarial examples over the network by submitting queries and inspecting returns.
1 code implementation • 19 Feb 2020 • Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Hai-Tao Zheng, Ben Y. Zhao
In this paper, we propose Fawkes, a system that helps individuals inoculate their images against unauthorized facial recognition models.
1 code implementation • 2 Oct 2019 • Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng
We empirically show that our proposed watermarks achieve piracy resistance and other watermark properties, over a wide range of tasks and models.
1 code implementation • 18 Apr 2019 • Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Hai-Tao Zheng, Ben Y. Zhao
Attackers' optimization algorithms gravitate towards trapdoors, leading them to produce attacks similar to trapdoors in the feature space.