A grey-box attack against latent diffusion model-based image editing by posterior collapse

Z Guo, L Fang, J Lin, Y Qian, S Zhao, Z Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Recent advancements in generative AI, particularly Latent Diffusion Models (LDMs), have
revolutionized image synthesis and manipulation. However, these generative techniques …

Instruct2Attack: Language-Guided Semantic Adversarial Attacks

J Liu, C Wei, Y Guo, H Yu, A Yuille, S Feizi… - arXiv preprint arXiv …, 2023 - arxiv.org
We propose Instruct2Attack (I2A), a language-guided semantic attack that generates
semantically meaningful perturbations according to free-form language instructions. We …

Interpolated joint space adversarial training for robust and generalizable defenses

CP Lau, J Liu, H Souri, WA Lin, S Feizi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Adversarial training (AT) is considered to be one of the most reliable defenses against
adversarial attacks. However, models trained with AT sacrifice standard accuracy and do not …

Instant Adversarial Purification with Adversarial Consistency Distillation

CT Lei, HM Yam, Z Guo, CP Lau - arXiv preprint arXiv:2408.17064, 2024 - arxiv.org
Neural networks, despite their remarkable performance in widespread applications,
including image classification, are also known to be vulnerable to subtle adversarial noise …

MMAD-Purify: A Precision-Optimized Framework for Efficient and Scalable Multi-Modal Attacks

X Liu, Z Guo, S Huang, CP Lau - arXiv preprint arXiv:2410.14089, 2024 - arxiv.org
Neural networks have achieved remarkable performance across a wide range of tasks, yet
they remain susceptible to adversarial perturbations, which pose significant risks in safety …

Identifying Attack-Specific Signatures in Adversarial Examples

H Souri, P Khorramshahi, CP Lau… - ICASSP 2024-2024 …, 2024 - ieeexplore.ieee.org
The adversarial attack literature contains numerous algorithms for crafting perturbations
which manipulate neural network predictions. Many of these adversarial attacks optimize …

Adversarial Attacks and Defenses in Capsule Networks: A Critical Review of Robustness Challenges and Mitigation Strategies

M Shah, K Gandhi, S Joshi, MD Nagar, V Patel… - … on Advanced Computing …, 2023 - Springer
Abstract Capsule Networks (CapsNets) have gained significant attention in recent years due
to their potential for improved representation learning and robustness. However, their …

A Historical, Present, and Prospective Review of Artificial Intelligence's Role in Securing Personal Information and Private Data

S Gupta, NK Goyal, A Kumar - Artificial Intelligence and …, 2024 - taylorfrancis.com
Cybercrime, in its many forms, has become a pervasive and escalating threat in today's
interconnected digital world. It includes many different types of illegal acts. committed using …

[引用][C] 257 A Historical, Present, and Prospective Review of Artificial Intelligence's Role in Securing Personal Information and Private Data

S Gupta, NK Goyal, A Kumar - … and Communication Techniques in Industry 5.0 - CRC Press