Anti-dreambooth: Protecting users from personalized text-to-image synthesis

T Van Le, H Phung, TH Nguyen… - Proceedings of the …, 2023 - openaccess.thecvf.com
Text-to-image diffusion models are nothing but a revolution, allowing anyone, even without
design skills, to create realistic images from simple text inputs. With powerful personalization …

Downstream-agnostic adversarial examples

Z Zhou, S Hu, R Zhao, Q Wang… - Proceedings of the …, 2023 - openaccess.thecvf.com
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an
encoder which can be used as a general-purpose feature extractor, such that downstream …

Advclip: Downstream-agnostic adversarial examples in multimodal contrastive learning

Z Zhou, S Hu, M Li, H Zhang, Y Zhang… - Proceedings of the 31st …, 2023 - dl.acm.org
Multimodal contrastive learning aims to train a general-purpose feature extractor, such as
CLIP, on vast amounts of raw, unlabeled paired image-text data. This can greatly benefit …

Self-supervised vision transformer-based few-shot learning for facial expression recognition

X Chen, X Zheng, K Sun, W Liu, Y Zhang - Information Sciences, 2023 - Elsevier
Facial expression recognition (FER) is embedded in many real-world human-computer
interaction tasks, such as online learning, depression recognition and remote diagnosis …

Clip2protect: Protecting facial privacy using text-guided makeup via adversarial latent search

F Shamshad, M Naseer… - Proceedings of the …, 2023 - openaccess.thecvf.com
The success of deep learning based face recognition systems has given rise to serious
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …

StyLess: boosting the transferability of adversarial examples

K Liang, B Xiao - Proceedings of the IEEE/CVF Conference …, 2023 - openaccess.thecvf.com
Adversarial attacks can mislead deep neural networks (DNNs) by adding imperceptible
perturbations to benign examples. The attack transferability enables adversarial examples to …

BRPPNet: Balanced privacy protection network for referring personal image privacy protection

J Lin, X Dai, K Nai, J Yuan, Z Li, X Zhang, S Li - Expert Systems with …, 2023 - Elsevier
Traditional personal image privacy protection usually suffers from the overprotection
problem, where one or more undesired persons in an image may be inevitably shielded …

PRO-face: A generic framework for privacy-preserving recognizable obfuscation of face images

L Yuan, L Liu, X Pu, Z Li, H Li, X Gao - Proceedings of the 30th ACM …, 2022 - dl.acm.org
A number of applications (eg, video surveillance and authentication) rely on automated face
recognition to guarantee functioning of secure services, and meanwhile, have to take into …

Robust and privacy-preserving collaborative training: a comprehensive survey

F Yang, X Zhang, S Guo, D Chen, Y Gan… - Artificial Intelligence …, 2024 - Springer
Increasing numbers of artificial intelligence systems are employing collaborative machine
learning techniques, such as federated learning, to build a shared powerful deep model …

Diffprotect: Generate adversarial examples with diffusion models for facial privacy protection

J Liu, CP Lau, R Chellappa - arXiv preprint arXiv:2305.13625, 2023 - arxiv.org
The increasingly pervasive facial recognition (FR) systems raise serious concerns about
personal privacy, especially for billions of users who have publicly shared their photos on …