Search Results for author: Shawn Shan

Found 9 papers, 4 papers with code

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?

no code implementations5 Feb 2024 Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao

We curate real human art across 7 styles, generate matching images from 5 generative models, and apply 8 detectors (5 automated detectors and 3 different human groups including 180 crowdworkers, 4000+ professional artists, and 13 expert artists experienced at detecting AI).

SoK: Anti-Facial Recognition Technology

no code implementations8 Dec 2021 Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao

The rapid adoption of facial recognition (FR) technology by both government and commercial entities in recent years has raised concerns about civil liberties and privacy.

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

no code implementations13 Oct 2021 Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao

We propose a novel iterative clustering and pruning solution that trims "innocent" training samples, until all that remains is the set of poisoned data responsible for the attack.

Data Poisoning Malware Classification

A Real-time Defense against Website Fingerprinting Attacks

no code implementations8 Feb 2021 Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao

We experimentally demonstrate that Dolos provides 94+% protection against state-of-the-art WF attacks under a variety of settings.

Website Fingerprinting Attacks Cryptography and Security

Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks

1 code implementation24 Jun 2020 Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Hai-Tao Zheng, Ben Y. Zhao

In particular, query-based black-box attacks do not require knowledge of the deep learning model, but can compute adversarial examples over the network by submitting queries and inspecting returns.

Image Classification text-classification +1

Fawkes: Protecting Privacy against Unauthorized Deep Learning Models

1 code implementation19 Feb 2020 Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Hai-Tao Zheng, Ben Y. Zhao

In this paper, we propose Fawkes, a system that helps individuals inoculate their images against unauthorized facial recognition models.

Face Recognition Privacy Preserving Deep Learning

Piracy Resistant Watermarks for Deep Neural Networks

1 code implementation2 Oct 2019 Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng

We empirically show that our proposed watermarks achieve piracy resistance and other watermark properties, over a wide range of tasks and models.

Transfer Learning

Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks

1 code implementation18 Apr 2019 Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Hai-Tao Zheng, Ben Y. Zhao

Attackers' optimization algorithms gravitate towards trapdoors, leading them to produce attacks similar to trapdoors in the feature space.

Adversarial Attack Detection Adversarial Defense +3

Cannot find the paper you are looking for? You can Submit a new open access paper.