Picture for Ben Y. Zhao

Ben Y. Zhao

MYCROFT: Towards Effective and Efficient External Data Augmentation

Add code
Oct 11, 2024
Figure 1 for MYCROFT: Towards Effective and Efficient External Data Augmentation
Figure 2 for MYCROFT: Towards Effective and Efficient External Data Augmentation
Figure 3 for MYCROFT: Towards Effective and Efficient External Data Augmentation
Figure 4 for MYCROFT: Towards Effective and Efficient External Data Augmentation
Viaarxiv icon

Disrupting Style Mimicry Attacks on Video Imagery

Add code
May 11, 2024
Viaarxiv icon

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?

Add code
Feb 06, 2024
Viaarxiv icon

Towards Scalable and Robust Model Versioning

Add code
Jan 17, 2024
Viaarxiv icon

Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models

Add code
Oct 20, 2023
Viaarxiv icon

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker

Add code
Feb 21, 2023
Viaarxiv icon

Data Isotopes for Data Provenance in DNNs

Add code
Aug 29, 2022
Figure 1 for Data Isotopes for Data Provenance in DNNs
Figure 2 for Data Isotopes for Data Provenance in DNNs
Figure 3 for Data Isotopes for Data Provenance in DNNs
Figure 4 for Data Isotopes for Data Provenance in DNNs
Viaarxiv icon

Natural Backdoor Datasets

Add code
Jun 21, 2022
Figure 1 for Natural Backdoor Datasets
Figure 2 for Natural Backdoor Datasets
Figure 3 for Natural Backdoor Datasets
Figure 4 for Natural Backdoor Datasets
Viaarxiv icon

Can Backdoor Attacks Survive Time-Varying Models?

Add code
Jun 08, 2022
Figure 1 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 2 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 3 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 4 for Can Backdoor Attacks Survive Time-Varying Models?
Viaarxiv icon

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

Add code
Feb 11, 2022
Viaarxiv icon