Picture for Nils Lukas

Nils Lukas

Optimizing Adaptive Attacks against Content Watermarks for Language Models

Add code
Oct 03, 2024
Figure 1 for Optimizing Adaptive Attacks against Content Watermarks for Language Models
Figure 2 for Optimizing Adaptive Attacks against Content Watermarks for Language Models
Figure 3 for Optimizing Adaptive Attacks against Content Watermarks for Language Models
Figure 4 for Optimizing Adaptive Attacks against Content Watermarks for Language Models
Viaarxiv icon

Universal Backdoor Attacks

Add code
Nov 30, 2023
Viaarxiv icon

Leveraging Optimization for Adaptive Attacks on Image Watermarks

Add code
Sep 29, 2023
Viaarxiv icon

Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions

Add code
Jun 14, 2023
Viaarxiv icon

Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks against Deep Image Classification

Add code
May 07, 2023
Viaarxiv icon

PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators

Add code
Apr 14, 2023
Viaarxiv icon

Analyzing Leakage of Personally Identifiable Information in Language Models

Add code
Feb 01, 2023
Figure 1 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 2 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 3 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 4 for Analyzing Leakage of Personally Identifiable Information in Language Models
Viaarxiv icon

SoK: How Robust is Image Classification Deep Neural Network Watermarking?

Add code
Aug 11, 2021
Figure 1 for SoK: How Robust is Image Classification Deep Neural Network Watermarking?
Figure 2 for SoK: How Robust is Image Classification Deep Neural Network Watermarking?
Figure 3 for SoK: How Robust is Image Classification Deep Neural Network Watermarking?
Figure 4 for SoK: How Robust is Image Classification Deep Neural Network Watermarking?
Viaarxiv icon

Deep Neural Network Fingerprinting by Conferrable Adversarial Examples

Add code
Dec 02, 2019
Figure 1 for Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Figure 2 for Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Figure 3 for Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Figure 4 for Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Viaarxiv icon

On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks

Add code
Jun 18, 2019
Figure 1 for On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks
Figure 2 for On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks
Figure 3 for On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks
Figure 4 for On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks
Viaarxiv icon