no code implementations • 15 Jun 2023 • Federica Spinola, Philipp Benz, Minhyeong Yu, Tae-hoon Kim
In real-world scenarios we often need to perform multiple tasks simultaneously.
no code implementations • 19 Aug 2022 • Jinwoo Hwang, Philipp Benz, Tae-hoon Kim
Improving multi-view aggregation is integral for multi-view pedestrian detection, which aims to obtain a bird's-eye-view pedestrian occupancy map from images captured through a set of calibrated cameras.
no code implementations • 4 Aug 2022 • Jonghu Jeong, Minyong Cho, Philipp Benz, Jinwoo Hwang, Jeewook Kim, Seungkwan Lee, Tae-hoon Kim
We further conduct a user study to qualitatively assess our defense of the reconstruction attack.
no code implementations • 30 Mar 2022 • Chaoning Zhang, Philipp Benz, Adil Karjauv, Jae Won Cho, Kang Zhang, In So Kweon
It is widely reported that stronger I-FGSM transfers worse than simple FGSM, leading to a popular belief that transferability is at odds with the white-box attack strength.
no code implementations • CVPR 2022 • Chaoning Zhang, Philipp Benz, Adil Karjauv, Jae Won Cho, Kang Zhang, In So Kweon
It is widely reported that stronger I-FGSM transfers worse than simple FGSM, leading to a popular belief that transferability is at odds with the white-box attack strength.
1 code implementation • 6 Oct 2021 • Philipp Benz, Soomin Ham, Chaoning Zhang, Adil Karjauv, In So Kweon
Thus, it is critical for the community to know whether the newly proposed ViT and MLP-Mixer are also vulnerable to adversarial attacks.
no code implementations • 29 Sep 2021 • Chaoning Zhang, Gyusang Cho, Philipp Benz, Kang Zhang, Chenshuang Zhang, Chan-Hyun Youn, In So Kweon
The transferability of adversarial examples (AE); known as adversarial transferability, has attracted significant attention because it can be exploited for TransferableBlack-box Attacks (TBA).
no code implementations • 7 Apr 2021 • Philipp Benz, Chaoning Zhang, Adil Karjauv, In So Kweon
The SOTA universal adversarial training (UAT) method optimizes a single perturbation for all training samples in the mini-batch.
1 code implementation • 2 Mar 2021 • Chaoning Zhang, Philipp Benz, Chenguo Lin, Adil Karjauv, Jing Wu, In So Kweon
The intriguing phenomenon of adversarial examples has attracted significant attention in machine learning and what might be more surprising to the community is the existence of universal adversarial perturbations (UAPs), i. e. a single perturbation to fool the target DNN for most images.
no code implementations • 2 Mar 2021 • Chaoning Zhang, Chenguo Lin, Philipp Benz, Kejiang Chen, Weiming Zhang, In So Kweon
Data hiding is the art of concealing messages with limited perceptual changes.
no code implementations • 12 Feb 2021 • Chaoning Zhang, Philipp Benz, Adil Karjauv, In So Kweon
We perform task-specific and joint analysis and reveal that (a) frequency is a key factor that influences their performance based on the proposed entropy metric for quantifying the frequency distribution; (b) their success can be attributed to a DNN being highly sensitive to high-frequency content.
no code implementations • ICCV 2021 • Chaoning Zhang, Philipp Benz, Adil Karjauv, In So Kweon
For a more practical universal attack, our investigation of untargeted UAP focuses on alleviating the dependence on the original training samples, from removing the need for sample labels to limiting the sample size.
1 code implementation • 30 Dec 2020 • Chaoning Zhang, Adil Karjauv, Philipp Benz, In So Kweon
Recently, deep learning has shown large success in data hiding, while non-differentiability of JPEG makes it challenging to train a deep pipeline for improving robustness against lossy compression.
1 code implementation • NeurIPS 2020 • Chaoning Zhang, Philipp Benz, Adil Karjauv, Geng Sun, In Kweon
This is the first work demonstrating the success of (DNN-based) hiding a full image for watermarking and LFM.
no code implementations • 26 Oct 2020 • Philipp Benz, Chaoning Zhang, Adil Karjauv, In So Kweon
Adversarial training is the most widely used technique for improving adversarial robustness to strong white-box attacks.
1 code implementation • 23 Oct 2020 • Chaoning Zhang, Philipp Benz, Dawit Mureja Argaw, Seokju Lee, Junsik Kim, Francois Rameau, Jean-Charles Bazin, In So Kweon
ResNet or DenseNet?
1 code implementation • 7 Oct 2020 • Philipp Benz, Chaoning Zhang, Tooba Imtiaz, In So Kweon
This universal perturbation attacks one targeted source class to sink class, while having a limited adversarial effect on other non-targeted source classes, for avoiding raising suspicions.
no code implementations • 7 Oct 2020 • Chaoning Zhang, Philipp Benz, Tooba Imtiaz, In So Kweon
Since the proposed attack generates a universal adversarial perturbation that is discriminative to targeted and non-targeted classes, we term it class discriminative universal adversarial perturbation (CD-UAP).
1 code implementation • ICCV 2021 • Philipp Benz, Chaoning Zhang, In So Kweon
This work attempts to understand the impact of BN on DNNs from a non-robust feature perspective.
no code implementations • 7 Oct 2020 • Philipp Benz, Chaoning Zhang, Adil Karjauv, In So Kweon
We find that simply estimating and adapting the BN statistics on a few (32 for instance) representation samples, without retraining the model, improves the corruption robustness by a large margin on several benchmark datasets with a wide range of model architectures.
1 code implementation • CVPR 2020 • Chaoning Zhang, Philipp Benz, Tooba Imtiaz, In-So Kweon
We utilize this vector representation to understand adversarial examples by disentangling the clean images and adversarial perturbations, and analyze their influence on each other.
no code implementations • 13 Jul 2020 • Philipp Benz, Chaoning Zhang, Tooba Imtiaz, In-So Kweon
We repeat the process of Data to Model (DtM) and Data from Model (DfM) in sequence and explore the loss of feature mapping information by measuring the accuracy drop on the original validation dataset.
no code implementations • 30 Jul 2019 • Ho-Deok Jang, Sanghyun Woo, Philipp Benz, Jinsun Park, In So Kweon
We present a simple yet effective prediction module for a one-stage detector.