It has been recognized that the data generated by the denoising diffusion probabilistic model (DDPM) improves adversarial training. After two years of rapid development in …
Existing image restoration methods mostly leverage the posterior distribution of natural images. However, they often assume known degradation and also require supervised …
H Zhuang, Y Zhang, S Liu - … of the IEEE/CVF Conference on …, 2023 - openaccess.thecvf.com
Despite the record-breaking performance in Text-to-Image (T2I) generation by Stable Diffusion, less research attention is paid to its adversarial robustness. In this work, we study …
Neural networks are known to be susceptible to adversarial samples: small variations of natural examples crafted to deliberatelymislead the models. While they can be easily …
Z Gu, H Chen, Z Xu - ICASSP 2024-2024 IEEE International …, 2024 - ieeexplore.ieee.org
Diffusion frameworks have achieved comparable performance with previous state-of-the-art image generation models. This paper proposes DiffusionInst, a novel framework …
M Lee, D Kim - Proceedings of the IEEE/CVF International …, 2023 - openaccess.thecvf.com
We question the current evaluation practice on diffusion-based purification methods. Diffusion-based purification methods aim to remove adversarial effects from an input data …
Diffusion models have been leveraged to perform adversarial purification and thus provide both empirical and certified robustness for a standard model. On the other hand, different …
W Jiang, Y Diao, H Wang, J Sun, M Wang… - Proceedings of the 31st …, 2023 - dl.acm.org
Safeguarding data from unauthorized exploitation is vital for privacy and security, especially in recent rampant research in security breach such as adversarial/membership attacks. To …