Glaze: Protecting artists from style mimicry by {Text-to-Image} models

S Shan, J Cryan, E Wenger, H Zheng… - 32nd USENIX Security …, 2023 - usenix.org
Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to
displace many in the professional artist community. In particular, models can learn to mimic …

Clip2protect: Protecting facial privacy using text-guided makeup via adversarial latent search

F Shamshad, M Naseer… - Proceedings of the …, 2023 - openaccess.thecvf.com
The success of deep learning based face recognition systems has given rise to serious
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …

{FACE-AUDITOR}: Data Auditing in Facial Recognition Systems

M Chen, Z Zhang, T Wang, M Backes… - 32nd USENIX Security …, 2023 - usenix.org
Few-shot-based facial recognition systems have gained increasing attention due to their
scalability and ability to work with a few face images during the model deployment phase …

Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective

X Zhang, H Ye, Z Huang, X Ye, Y Cao… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Face Verification Systems (FVSes) are more and more deployed by real-world mobile
applications (apps) to verify a human's claimed identity. One popular type of FVSes is called …

Transferable adversarial facial images for privacy protection

M Li, J Wang, H Zhang, Z Zhou, S Hu… - Proceedings of the 32nd …, 2024 - dl.acm.org
The success of deep face recognition (FR) systems has raised serious privacy concerns due
to their ability to enable unauthorized tracking of users in the digital world. Previous studies …

Diversity-driven privacy protection masks against unauthorized face recognition

KH Chow, S Hu, T Huang, F Ilhan… - Proceedings on Privacy …, 2024 - petsymposium.org
Face recognition (FR) technologies have enabled many life-enriching applications but have
also opened doors for potential misuse. Governments, private companies, or even …

Face De-identification: State-of-the-art Methods and Comparative Studies

J Cao, X Chen, B Liu, M Ding, R Xie, L Song… - arXiv preprint arXiv …, 2024 - arxiv.org
The widespread use of image acquisition technologies, along with advances in facial
recognition, has raised serious privacy concerns. Face de-identification usually refers to the …

Group-based Robustness: A General Framework for Customized Robustness in the Real World

W Lin, K Lucas, N Eyal, L Bauer, MK Reiter… - arXiv preprint arXiv …, 2023 - arxiv.org
Machine-learning models are known to be vulnerable to evasion attacks that perturb model
inputs to induce misclassifications. In this work, we identify real-world scenarios where the …

Personalized Privacy Protection Mask Against Unauthorized Facial Recognition

KH Chow, S Hu, T Huang, L Liu - European Conference on Computer …, 2025 - Springer
Face recognition (FR) can be abused for privacy intrusion. Governments, private companies,
or even individual attackers can collect facial images by web scraping to build an FR system …

Campro: Camera-based anti-facial recognition

W Zhu, Y Sun, J Liu, Y Cheng, X Ji, W Xu - arXiv preprint arXiv:2401.00151, 2023 - arxiv.org
The proliferation of images captured from millions of cameras and the advancement of facial
recognition (FR) technology have made the abuse of FR a severe privacy threat. Existing …