Image Processing

Downscaling Attack and Defense: Turning What You See Back Into What You Get

Authors: Andrew J. Lohn | Published: 2020-10-06 | Updated: 2020-10-07
Attack Type
Adversarial attack
Image Processing

An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood

Authors: Teddy Furon | Published: 2020-10-02 | Updated: 2022-05-20
Data Management System
Robustness Evaluation
Image Processing

Black Box to White Box: Discover Model Characteristics Based on Strategic Probing

Authors: Josh Kalin, Matthew Ciolino, David Noever, Gerry Dozier | Published: 2020-09-07
Adversarial Attack Methods
Machine Learning Method
Image Processing

CLEANN: Accelerated Trojan Shield for Embedded Neural Networks

Authors: Mojan Javaheripi, Mohammad Samragh, Gregory Fields, Tara Javidi, Farinaz Koushanfar | Published: 2020-09-04
Trojan Detection
Membership Inference
Image Processing

OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training

Authors: Eran Segalis, Eran Galili | Published: 2020-06-17 | Updated: 2020-11-25
Adversarial Attack Methods
Machine Learning Algorithm
Image Processing

ArchNet: Data Hiding Model in Distributed Machine Learning System

Authors: Kaiyan Chang, Wei Jiang, Jinyu Zhan, Zicheng Gong, Weijia Pan | Published: 2020-04-23 | Updated: 2020-05-31
Encryption Protocol
Machine Learning
Image Processing

PrivEdge: From Local to Distributed Private Training and Prediction

Authors: Ali Shahin Shamsabadi, Adria Gascon, Hamed Haddadi, Andrea Cavallaro | Published: 2020-04-12
Privacy Protection Method
Privacy Issues
Image Processing

Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives

Authors: Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte | Published: 2020-02-11 | Updated: 2021-04-07
Hardware Security
Image Processing
Design Verification

Fast-UAP: An Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors

Authors: Jiazhu Dai, Le Shu | Published: 2019-11-04 | Updated: 2020-01-06
Attack Method
Adversarial Example
Image Processing

STGAN: A Unified Selective Transfer Network for Arbitrary Image Attribute Editing

Authors: Ming Liu, Yukang Ding, Min Xia, Xiao Liu, Errui Ding, Wangmeng Zuo, Shilei Wen | Published: 2019-04-22
Data Generation
Deepfake
Image Processing