Search Results for author: Sen Peng

Found 5 papers, 2 papers with code

CAT: Contrastive Adversarial Training for Evaluating the Robustness of Protective Perturbations in Latent Diffusion Models

1 code implementation11 Feb 2025 Sen Peng, Mingyue Wang, Jianfei He, Jijia Yang, Xiaohua Jia

In this paper, we first reveal that the primary reason adversarial examples are effective as protective perturbations in latent diffusion models is the distortion of their latent representations, as demonstrated through qualitative and quantitative experiments.

Image Generation

RMAvatar: Photorealistic Human Avatar Reconstruction from Monocular Video Based on Rectified Mesh-embedded Gaussians

no code implementations13 Jan 2025 Sen Peng, Weixing Xie, Zilong Wang, Xiaohu Guo, Zhonggui Chen, Baorong Yang, Xiao Dong

We introduce RMAvatar, a novel human avatar representation with Gaussian splatting embedded on mesh to learn clothed avatar from a monocular video.

Embedding Watermarks in Diffusion Process for Model Intellectual Property Protection

no code implementations29 Oct 2024 Jijia Yang, Sen Peng, Xiaohua Jia

In practical application, the widespread deployment of diffusion models often necessitates substantial investment in training.

backdoor defense

Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process

1 code implementation6 Jun 2023 Sen Peng, Yufei Chen, Cong Wang, Xiaohua Jia

This paper introduces WDM, a novel watermarking solution for diffusion models without imprinting the watermark during task generation.

Cannot find the paper you are looking for? You can Submit a new open access paper.