Search Results for author: Run Wang

Found 18 papers, 7 papers with code

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models

1 code implementation14 Oct 2024 Boheng Li, Yanhao Wei, Yankai Fu, Zhenting Wang, Yiming Li, Jie Zhang, Run Wang, Tianwei Zhang

In this paper, we introduce SIREN, a novel methodology to proactively trace unauthorized data usage in black-box personalized text-to-image diffusion models.

Perception-guided Jailbreak against Text-to-Image Models

no code implementations20 Aug 2024 Yihao Huang, Le Liang, Tianlin Li, Xiaojun Jia, Run Wang, Weikai Miao, Geguang Pu, Yang Liu

Specifically, we propose identifying a safe phrase that is similar in human perception yet inconsistent in text semantics with the target unsafe word and using it as a substitution.

Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

no code implementations28 May 2024 Di Yang, Yihao Huang, Qing Guo, Felix Juefei-Xu, Xiaojun Jia, Run Wang, Geguang Pu, Yang Liu

The widespread use of diffusion methods enables the creation of highly realistic images on demand, thereby posing significant risks to the integrity and safety of online information and highlighting the necessity of DeepFake detection.

DeepFake Detection Face Swapping

Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models

no code implementations25 Mar 2024 Ziyou Liang, Run Wang, Weifeng Liu, Yuyang Zhang, Wenyuan Yang, Lina Wang, Xingkai Wang

Unfortunately, the artifact patterns in fake images synthesized by different generative models are inconsistent, leading to the failure of previous research that relied on spotting subtle differences between real and fake.

Contrastive Learning

Lips Are Lying: Spotting the Temporal Inconsistency between Audio and Visual in Lip-Syncing DeepFakes

1 code implementation28 Jan 2024 Weifeng Liu, Tianyi She, Jiawei Liu, Boheng Li, Dongyu Yao, Ziyou Liang, Run Wang

In recent years, DeepFake technology has achieved unprecedented success in high-quality video synthesis, but these methods also pose potential and severe security threats to humanity.

DeepFake Detection Face Swapping

Enhancing RAW-to-sRGB with Decoupled Style Structure in Fourier Domain

1 code implementation4 Jan 2024 Xuanhua He, Tao Hu, Guoli Wang, Zejin Wang, Run Wang, Qian Zhang, Keyu Yan, Ziyi Chen, Rui Li, Chenjun Xie, Jie Zhang, Man Zhou

However, current methods often ignore the difference between cell phone RAW images and DSLR camera RGB images, a difference that goes beyond the color matrix and extends to spatial structure due to resolution variations.

Image Restoration

SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning

no code implementations9 Aug 2023 Xiaobei Li, Changchun Yin, Liyue Zhu, Xiaogang Xu, Liming Fang, Run Wang, Chenhao Lin

Self-supervised learning (SSL), a paradigm harnessing unlabeled datasets to train robust encoders, has recently witnessed substantial success.

Self-Supervised Learning

Hard Adversarial Example Mining for Improving Robust Fairness

no code implementations3 Aug 2023 Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang

Adversarial training (AT) is widely considered the state-of-the-art technique for improving the robustness of deep neural networks (DNNs) against adversarial examples (AE).

Fairness

Fingerprinting Image-to-Image Generative Adversarial Networks

no code implementations19 Jun 2021 Guanlin Li, Guowen Xu, Han Qiu, Shangwei Guo, Run Wang, Jiwei Li, Tianwei Zhang, Rongxing Lu

Since the production of a commercial GAN requires substantial computational and human resources, the copyright protection of GANs is urgently needed.

Image-to-Image Translation

Countering Malicious DeepFakes: Survey, Battleground, and Horizon

1 code implementation27 Feb 2021 Felix Juefei-Xu, Run Wang, Yihao Huang, Qing Guo, Lei Ma, Yang Liu

To fill this gap, in this paper, we provide a comprehensive overview and detailed analysis of the research work on the topic of DeepFake generation, DeepFake detection as well as evasion of DeepFake detection, with more than 318 research papers carefully surveyed.

DeepFake Detection Face Swapping +2

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction

1 code implementation13 Jun 2020 Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu

At this moment, GAN-based image generation methods are still imperfect, whose upsampling design has limitations in leaving some certain artifact patterns in the synthesized image.

DeepFake Detection Face Swapping +2

Amora: Black-box Adversarial Morphing Attack

no code implementations9 Dec 2019 Run Wang, Felix Juefei-Xu, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Yang Liu

In this paper, we investigate and introduce a new type of adversarial attack to evade FR systems by manipulating facial content, called \textbf{\underline{a}dversarial \underline{mor}phing \underline{a}ttack} (a. k. a.

Adversarial Attack Dictionary Learning +3

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces

no code implementations13 Sep 2019 Run Wang, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yihao Huang, Jian Wang, Yang Liu

In recent years, generative adversarial networks (GANs) and its variants have achieved unprecedented success in image synthesis.

Face Detection Face Recognition +2

Towards a Robust Deep Neural Network in Texts: A Survey

no code implementations12 Feb 2019 Wenqi Wang, Run Wang, Lina Wang, Zhibo Wang, Aoshuang Ye

Recently, studies have revealed adversarial examples in the text domain, which could effectively evade various DNN-based text analyzers and further bring the threats of the proliferation of disinformation.

General Classification Image Classification +3

Prediction of the Yield of Enzymatic Synthesis of Betulinic Acid Ester Using Artificial Neural Networks and Support Vector Machine

no code implementations12 Nov 2015 Run Wang, Qiaoli Mo, Qian Zhang, Fudi Chen, Dazuo Yang

To simplify the number of times of optimization in experimental works, here, we use artificial neural network (ANN) and support vector machine (SVM) models for the prediction of yields of 3\b{eta}-O-phthalic ester of betulinic acid synthesized by betulinic acid and phthalic anhydride using lipase as biocatalyst.

Cannot find the paper you are looking for? You can Submit a new open access paper.