Skip to main content

Showing 1–3 of 3 results for author: Menn, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.17109  [pdf, other

    cs.CV cs.LG

    Similarity Trajectories: Linking Sampling Process to Artifacts in Diffusion-Generated Images

    Authors: Dennis Menn, Feng Liang, Hung-Yueh Chiang, Diana Marculescu

    Abstract: Artifact detection algorithms are crucial to correcting the output generated by diffusion models. However, because of the variety of artifact forms, existing methods require substantial annotated data for training. This requirement limits their scalability and efficiency, which restricts their wide application. This paper shows that the similarity of denoised images between consecutive time steps… ▽ More

    Submitted 22 December, 2024; originally announced December 2024.

  2. arXiv:2309.16878  [pdf, other

    cs.LG cs.AI cs.CV

    Investigating Human-Identifiable Features Hidden in Adversarial Perturbations

    Authors: Dennis Y. Menn, Tzu-hsun Feng, Sriram Vishwanath, Hung-yi Lee

    Abstract: Neural networks perform exceedingly well across various machine learning tasks but are not immune to adversarial perturbations. This vulnerability has implications for real-world applications. While much research has been conducted, the underlying reasons why neural networks fall prey to adversarial attacks are not yet fully understood. Central to our study, which explores up to five attack algori… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

  3. arXiv:2205.15357  [pdf, other

    cs.LG cs.CV cs.NE

    Searching for the Essence of Adversarial Perturbations

    Authors: Dennis Y. Menn, Tzu-hsun Feng, Hung-yi Lee

    Abstract: Neural networks have demonstrated state-of-the-art performance in various machine learning fields. However, the introduction of malicious perturbations in input data, known as adversarial examples, has been shown to deceive neural network predictions. This poses potential risks for real-world applications such as autonomous driving and text identification. In order to mitigate these risks, a compr… ▽ More

    Submitted 3 February, 2023; v1 submitted 30 May, 2022; originally announced May 2022.