Skip to main content

Showing 1–6 of 6 results for author: Naseh, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15213  [pdf, other

    cs.LG cs.AI cs.CR

    Injecting Bias in Text-To-Image Models via Composite-Trigger Backdoors

    Authors: Ali Naseh, Jaechul Roh, Eugene Bagdasaryan, Amir Houmansadr

    Abstract: Recent advances in large text-conditional image generative models such as Stable Diffusion, Midjourney, and DALL-E 3 have revolutionized the field of image generation, allowing users to produce high-quality, realistic images from textual prompts. While these developments have enhanced artistic creation and visual communication, they also present an underexplored attack opportunity: the possibility… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2404.13784  [pdf, other

    cs.CR cs.CL cs.CV

    Iteratively Prompting Multimodal LLMs to Reproduce Natural and AI-Generated Images

    Authors: Ali Naseh, Katherine Thai, Mohit Iyyer, Amir Houmansadr

    Abstract: With the digital imagery landscape rapidly evolving, image stocks and AI-generated image marketplaces have become central to visual media. Traditional stock images now exist alongside innovative platforms that trade in prompts for AI-generated visuals, driven by sophisticated APIs like DALL-E 3 and Midjourney. This paper studies the possibility of employing multi-modal models with enhanced visual… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

  3. arXiv:2312.07550  [pdf, other

    cs.CV cs.CL cs.CR cs.LG

    Understanding (Un)Intended Memorization in Text-to-Image Generative Models

    Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr

    Abstract: Multimodal machine learning, especially text-to-image models like Stable Diffusion and DALL-E 3, has gained significance for transforming text into detailed images. Despite their growing use and remarkable generative capabilities, there is a pressing need for a detailed examination of these models' behavior, particularly with respect to memorization. Historically, memorization in machine learnin… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  4. arXiv:2312.04692  [pdf, other

    cs.CR cs.CV cs.LG

    Diffence: Fencing Membership Privacy With Diffusion Models

    Authors: Yuefeng Peng, Ali Naseh, Amir Houmansadr

    Abstract: Deep learning models, while achieving remarkable performance across various tasks, are vulnerable to member inference attacks, wherein adversaries identify if a specific data point was part of a model's training set. This susceptibility raises substantial privacy concerns, especially when models are trained on sensitive datasets. Current defense methods often struggle to provide robust protection… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  5. arXiv:2312.03692  [pdf, other

    cs.CR cs.CV cs.LG

    Memory Triggers: Unveiling Memorization in Text-To-Image Generative Models through Word-Level Duplication

    Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr

    Abstract: Diffusion-based models, such as the Stable Diffusion model, have revolutionized text-to-image synthesis with their ability to produce high-quality, high-resolution images. These advancements have prompted significant progress in image generation and editing tasks. However, these models also raise concerns due to their tendency to memorize and potentially replicate exact training samples, posing pr… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  6. arXiv:2303.04729  [pdf, other

    cs.LG cs.CL cs.CR

    Stealing the Decoding Algorithms of Language Models

    Authors: Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr

    Abstract: A key component of generating text from modern language models (LM) is the selection and tuning of decoding algorithms. These algorithms determine how to generate text from the internal probability distribution generated by the LM. The process of choosing a decoding algorithm and tuning its hyperparameters takes significant time, manual effort, and computation, and it also requires extensive human… ▽ More

    Submitted 1 December, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Journal ref: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security