Diffusion art or digital forgery? investigating data replication in diffusion models

G Somepalli, V Singla, M Goldblum… - Proceedings of the …, 2023 - openaccess.thecvf.com
Cutting-edge diffusion models produce images with high quality and customizability,
enabling them to be used for commercial art and graphic design purposes. But do diffusion …

Unlocking feature visualization for deep network with magnitude constrained optimization

T FEL, T Boissin, V Boutin, A PICARD… - Advances in …, 2023 - proceedings.neurips.cc
Feature visualization has gained significant popularity as an explainability method,
particularly after the influential work by Olah et al. in 2017. Despite its success, its …

Unlocking feature visualization for deeper networks with magnitude constrained optimization

T Fel, T Boissin, V Boutin, A Picard, P Novello… - arXiv preprint arXiv …, 2023 - arxiv.org
Feature visualization has gained substantial popularity, particularly after the influential work
by Olah et al. in 2017, which established it as a crucial tool for explainability. However, its …

U Can't Gen This? A Survey of Intellectual Property Protection Methods for Data in Generative AI

T Šarčević, A Karlowicz, R Mayer… - arXiv preprint arXiv …, 2024 - arxiv.org
Large Generative AI (GAI) models have the unparalleled ability to generate text, images,
audio, and other forms of media that are increasingly indistinguishable from human …

DataFreeShield: Defending adversarial attacks without training data

H Lee, K Choi, D Kwon, S Park, MS Jaiswal… - arXiv preprint arXiv …, 2024 - arxiv.org
Recent advances in adversarial robustness rely on an abundant set of training data, where
using external or additional datasets has become a common setting. However, in real life …

NeuroInspect: Interpretable Neuron-based Debugging Framework through Class-conditional Visualizations

YJ Ju, JH Park, SW Lee - arXiv preprint arXiv:2310.07184, 2023 - arxiv.org
Despite deep learning (DL) has achieved remarkable progress in various domains, the DL
models are still prone to making mistakes. This issue necessitates effective debugging tools …

LazyDP: Co-Designing Algorithm-Software for Scalable Training of Differentially Private Recommendation Models

J Lim, Y Kwon, R Hwang, K Maeng, E Suh… - Proceedings of the 29th …, 2024 - dl.acm.org
Differential privacy (DP) is widely being employed in the industry as a practical standard for
privacy protection. While private training of computer vision or natural language processing …

Leaping Into Memories: Space-Time Deep Feature Synthesis

A Stergiou, N Deligiannis - Proceedings of the IEEE/CVF …, 2023 - openaccess.thecvf.com
The success of deep learning models has led to their adaptation and adoption by prominent
video understanding methods. The majority of these approaches encode features in a joint …

Model Inversion Attacks: A Survey of Approaches and Countermeasures

Z Zhou, J Zhu, F Yu, X Li, X Peng, T Liu… - arXiv preprint arXiv …, 2024 - arxiv.org
The success of deep neural networks has driven numerous research studies and
applications from Euclidean to non-Euclidean data. However, there are increasing concerns …

On mitigating stability-plasticity dilemma in CLIP-guided image morphing via geodesic distillation loss

Y Oh, S Lee, U Hwang, S Yoon - arXiv preprint arXiv:2401.10526, 2024 - arxiv.org
Large-scale language-vision pre-training models, such as CLIP, have achieved remarkable
text-guided image morphing results by leveraging several unconditional generative models …