Glaze: Protecting artists from style mimicry by {Text-to-Image} models
Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to
displace many in the professional artist community. In particular, models can learn to mimic …
displace many in the professional artist community. In particular, models can learn to mimic …
Clip2protect: Protecting facial privacy using text-guided makeup via adversarial latent search
F Shamshad, M Naseer… - Proceedings of the …, 2023 - openaccess.thecvf.com
The success of deep learning based face recognition systems has given rise to serious
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …
{FACE-AUDITOR}: Data Auditing in Facial Recognition Systems
Few-shot-based facial recognition systems have gained increasing attention due to their
scalability and ability to work with a few face images during the model deployment phase …
scalability and ability to work with a few face images during the model deployment phase …
Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective
Face Verification Systems (FVSes) are more and more deployed by real-world mobile
applications (apps) to verify a human's claimed identity. One popular type of FVSes is called …
applications (apps) to verify a human's claimed identity. One popular type of FVSes is called …
Transferable adversarial facial images for privacy protection
The success of deep face recognition (FR) systems has raised serious privacy concerns due
to their ability to enable unauthorized tracking of users in the digital world. Previous studies …
to their ability to enable unauthorized tracking of users in the digital world. Previous studies …
Diversity-driven privacy protection masks against unauthorized face recognition
Face recognition (FR) technologies have enabled many life-enriching applications but have
also opened doors for potential misuse. Governments, private companies, or even …
also opened doors for potential misuse. Governments, private companies, or even …
Face De-identification: State-of-the-art Methods and Comparative Studies
The widespread use of image acquisition technologies, along with advances in facial
recognition, has raised serious privacy concerns. Face de-identification usually refers to the …
recognition, has raised serious privacy concerns. Face de-identification usually refers to the …
Group-based Robustness: A General Framework for Customized Robustness in the Real World
Machine-learning models are known to be vulnerable to evasion attacks that perturb model
inputs to induce misclassifications. In this work, we identify real-world scenarios where the …
inputs to induce misclassifications. In this work, we identify real-world scenarios where the …
Personalized Privacy Protection Mask Against Unauthorized Facial Recognition
Face recognition (FR) can be abused for privacy intrusion. Governments, private companies,
or even individual attackers can collect facial images by web scraping to build an FR system …
or even individual attackers can collect facial images by web scraping to build an FR system …
Campro: Camera-based anti-facial recognition
The proliferation of images captured from millions of cameras and the advancement of facial
recognition (FR) technology have made the abuse of FR a severe privacy threat. Existing …
recognition (FR) technology have made the abuse of FR a severe privacy threat. Existing …