Search Results for author: Xinqiao Zhang

Found 6 papers, 2 papers with code

FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs

no code implementations26 Sep 2022 Shehzeen Hussain, Nojan Sheybani, Paarth Neekhara, Xinqiao Zhang, Javier Duarte, Farinaz Koushanfar

In this work, we design the first accelerator platform FastStamp to perform DNN based steganography and digital watermarking of images on hardware.

Image Steganography

zPROBE: Zero Peek Robustness Checks for Federated Learning

no code implementations ICCV 2023 Zahra Ghodsi, Mojan Javaheripi, Nojan Sheybani, Xinqiao Zhang, Ke Huang, Farinaz Koushanfar

However, keeping the individual updates private allows malicious users to perform Byzantine attacks and degrade the accuracy without being detected.

Federated Learning Privacy Preserving

AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection

no code implementations12 Apr 2022 Huili Chen, Xinqiao Zhang, Ke Huang, Farinaz Koushanfar

This paper proposes AdaTest, a novel adaptive test pattern generation framework for efficient and reliable Hardware Trojan (HT) detection.

Backdoor Attack Reinforcement Learning (RL)

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

1 code implementation8 Apr 2022 Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar

Deep Neural Networks (DNNs) have demonstrated unprecedented performance across various fields such as medical diagnosis and autonomous driving.

Autonomous Driving Medical Diagnosis

FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes

1 code implementation5 Apr 2022 Paarth Neekhara, Shehzeen Hussain, Xinqiao Zhang, Ke Huang, Julian McAuley, Farinaz Koushanfar

We demonstrate that FaceSigns can embed a 128 bit secret as an imperceptible image watermark that can be recovered with a high bit recovery accuracy at several compression levels, while being non-recoverable when unseen Deepfake manipulations are applied.

Face Swapping Image Compression +1

TAD: Trigger Approximation based Black-box Trojan Detection for AI

no code implementations3 Feb 2021 Xinqiao Zhang, Huili Chen, Farinaz Koushanfar

While DNNs are widely employed in security-sensitive fields, they are identified to be vulnerable to Neural Trojan (NT) attacks that are controlled and activated by the stealthy trigger.

Autonomous Driving Medical Diagnosis

Cannot find the paper you are looking for? You can Submit a new open access paper.