Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2403.15955
Cited By
v1
v2
v3 (latest)
Finding needles in a haystack: A Black-Box Approach to Invisible Watermark Detection
23 March 2024
Minzhou Pan
Zhengting Wang
Xin Dong
Vikash Sehwag
Lingjuan Lyu
Xue Lin
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Finding needles in a haystack: A Black-Box Approach to Invisible Watermark Detection"
16 / 16 papers shown
Title
Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks
Mehrdad Saberi
Vinu Sankar Sadasivan
Keivan Rezaei
Aounon Kumar
Atoosa Malemir Chegini
Wenxiao Wang
Soheil Feizi
WIGM
AAML
79
47
0
29 Sep 2023
Deep Learning for Steganalysis of Diverse Data Types: A review of methods, taxonomy, challenges and future directions
Hamza Kheddar
Mustapha Hemis
Yassine Himeur
David Megías
Abbes Amira
AAML
74
37
0
08 Aug 2023
Tree-Ring Watermarks: Fingerprints for Diffusion Images that are Invisible and Robust
Yuxin Wen
John Kirchenbauer
Jonas Geiping
Tom Goldstein
WIGM
101
115
0
31 May 2023
Evading Watermark based Detection of AI-Generated Content
Zhengyuan Jiang
Jinghuai Zhang
Neil Zhenqiang Gong
WIGM
78
82
0
05 May 2023
The Stable Signature: Rooting Watermarks in Latent Diffusion Models
Pierre Fernandez
Guillaume Couairon
Hervé Jégou
Matthijs Douze
Teddy Furon
WIGM
114
197
0
27 Mar 2023
ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms
Minzhou Pan
Yi Zeng
Lingjuan Lyu
Xinyu Lin
R. Jia
AAML
65
37
0
22 Feb 2023
BLIP-2: Bootstrapping Language-Image Pre-training with Frozen Image Encoders and Large Language Models
Junnan Li
Dongxu Li
Silvio Savarese
Steven C. H. Hoi
VLM
MLLM
429
4,642
0
30 Jan 2023
Autoregressive Perturbations for Data Poisoning
Pedro Sandoval-Segura
Vasu Singla
Jonas Geiping
Micah Goldblum
Tom Goldstein
David Jacobs
AAML
85
41
0
08 Jun 2022
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
Xiangyu Qi
Tinghao Xie
Jiachen T. Wang
Tong Wu
Saeed Mahloujifar
Prateek Mittal
AAML
60
52
0
26 May 2022
High-Resolution Image Synthesis with Latent Diffusion Models
Robin Rombach
A. Blattmann
Dominik Lorenz
Patrick Esser
Bjorn Ommer
3DV
496
15,768
0
20 Dec 2021
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective
Yi Zeng
Won Park
Z. Morley Mao
R. Jia
AAML
60
215
0
07 Apr 2021
A Brief Survey on Deep Learning Based Data Hiding
Chaoning Zhang
Chenguo Lin
Philipp Benz
Kejiang Chen
Weiming Zhang
In So Kweon
40
36
0
02 Mar 2021
Denoising Diffusion Implicit Models
Jiaming Song
Chenlin Meng
Stefano Ermon
VLM
DiffM
292
7,492
0
06 Oct 2020
HiDDeN: Hiding Data With Deep Networks
Jiren Zhu
Russell Kaplan
Justin Johnson
Li Fei-Fei
WIGM
54
755
0
26 Jul 2018
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILM
OOD
317
12,138
0
19 Jun 2017
Microsoft COCO: Common Objects in Context
Nayeon Lee
Michael Maire
Serge J. Belongie
Lubomir Bourdev
Ross B. Girshick
James Hays
Pietro Perona
Deva Ramanan
C. L. Zitnick
Piotr Dollár
ObjD
434
43,832
0
01 May 2014
1