ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2409.15119
  4. Cited By
Log-normal Mutations and their Use in Detecting Surreptitious Fake
  Images

Log-normal Mutations and their Use in Detecting Surreptitious Fake Images

23 September 2024
Ismail Labiad
Thomas Bäck
Pierre Fernandez
Laurent Najman
Tom Sander
Furong Ye
M. Zameshina
Olivier Teytaud
    AAML
ArXivPDFHTML

Papers citing "Log-normal Mutations and their Use in Detecting Surreptitious Fake Images"

17 / 17 papers shown
Title
Robustness of AI-Image Detectors: Fundamental Limits and Practical
  Attacks
Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks
Mehrdad Saberi
Vinu Sankar Sadasivan
Keivan Rezaei
Aounon Kumar
Atoosa Malemir Chegini
Wenxiao Wang
Soheil Feizi
WIGM
AAML
68
43
0
29 Sep 2023
Evading Watermark based Detection of AI-Generated Content
Evading Watermark based Detection of AI-Generated Content
Zhengyuan Jiang
Jinghuai Zhang
Neil Zhenqiang Gong
WIGM
58
81
0
05 May 2023
When to be Discrete: Analyzing Algorithm Performance on Discretized
  Continuous Problems
When to be Discrete: Analyzing Algorithm Performance on Discretized Continuous Problems
André Thomaser
Jacob De Nobel
Diederick Vermetten
Furong Ye
Thomas Bäck
Anna V. Kononova
23
4
0
25 Apr 2023
The Stable Signature: Rooting Watermarks in Latent Diffusion Models
The Stable Signature: Rooting Watermarks in Latent Diffusion Models
Pierre Fernandez
Guillaume Couairon
Hervé Jégou
Matthijs Douze
Teddy Furon
WIGM
92
192
0
27 Mar 2023
DIRE for Diffusion-Generated Image Detection
DIRE for Diffusion-Generated Image Detection
Zhendong Wang
Jianmin Bao
Wen-gang Zhou
Weilun Wang
Hezhen Hu
Hong Chen
Houqiang Li
72
214
0
16 Mar 2023
DE-FAKE: Detection and Attribution of Fake Images Generated by
  Text-to-Image Generation Models
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Zeyang Sha
Zheng Li
Ning Yu
Yang Zhang
DiffM
78
131
0
13 Oct 2022
CMA-ES with Margin: Lower-Bounding Marginal Probability for
  Mixed-Integer Black-Box Optimization
CMA-ES with Margin: Lower-Bounding Marginal Probability for Mixed-Integer Black-Box Optimization
Ryoki Hamano
Shota Saito
Masahiro Nomura
Shinichi Shirakawa
28
35
0
26 May 2022
Diffusion Models for Adversarial Purification
Diffusion Models for Adversarial Purification
Weili Nie
Brandon Guo
Yujia Huang
Chaowei Xiao
Arash Vahdat
Anima Anandkumar
WIGM
254
441
0
16 May 2022
High-Resolution Image Synthesis with Latent Diffusion Models
High-Resolution Image Synthesis with Latent Diffusion Models
Robin Rombach
A. Blattmann
Dominik Lorenz
Patrick Esser
Bjorn Ommer
3DV
410
15,486
0
20 Dec 2021
A Novel Watermarking Approach for Protecting Image Integrity based on a
  Hybrid Security Technique
A Novel Watermarking Approach for Protecting Image Integrity based on a Hybrid Security Technique
Ahmad M. Nagm
M. Torky
Khaled Y. Youssef
WIGM
24
2
0
17 Oct 2021
Learning Transferable Visual Models From Natural Language Supervision
Learning Transferable Visual Models From Natural Language Supervision
Alec Radford
Jong Wook Kim
Chris Hallacy
Aditya A. Ramesh
Gabriel Goh
...
Amanda Askell
Pamela Mishkin
Jack Clark
Gretchen Krueger
Ilya Sutskever
CLIP
VLM
918
29,372
0
26 Feb 2021
Benchmarking Discrete Optimization Heuristics with IOHprofiler
Benchmarking Discrete Optimization Heuristics with IOHprofiler
Carola Doerr
Furong Ye
Naama Horesh
Hao Wang
O. M. Shir
Thomas Bäck
74
72
0
19 Dec 2019
Square Attack: a query-efficient black-box adversarial attack via random
  search
Square Attack: a query-efficient black-box adversarial attack via random search
Maksym Andriushchenko
Francesco Croce
Nicolas Flammarion
Matthias Hein
AAML
83
987
0
29 Nov 2019
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen
Michael I. Jordan
Martin J. Wainwright
AAML
63
667
0
03 Apr 2019
Interpolating Local and Global Search by Controlling the Variance of
  Standard Bit Mutation
Interpolating Local and Global Search by Controlling the Variance of Standard Bit Mutation
Furong Ye
Carola Doerr
Thomas Bäck
51
24
0
17 Jan 2019
Evasion Attacks against Machine Learning at Test Time
Evasion Attacks against Machine Learning at Test Time
Battista Biggio
Igino Corona
Davide Maiorca
B. Nelson
Nedim Srndic
Pavel Laskov
Giorgio Giacinto
Fabio Roli
AAML
157
2,151
0
21 Aug 2017
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
277
19,049
0
20 Dec 2014
1