当前位置: 首页 > news >正文

企业网站在ps里做吗小红书信息流广告

企业网站在ps里做吗,小红书信息流广告,网站生成静态慢原因,上传文件网站根目录《Towards Black-Box Membership Inference Attack for Diffusion Models》 Abstract 识别艺术品是否用于训练扩散模型的挑战,重点是人工智能生成的艺术品中的成员推断攻击——copyright protection不需要访问内部模型组件的新型黑盒攻击方法展示了在评估 DALL-E …

《Towards Black-Box Membership Inference Attack for Diffusion Models》

Abstract

  1. 识别艺术品是否用于训练扩散模型的挑战,重点是人工智能生成的艺术品中的成员推断攻击——copyright protection
  2. 不需要访问内部模型组件的新型黑盒攻击方法
  3. 展示了在评估 DALL-E 生成的数据集方面的卓越性能。

作者主张

previous methods are not yet ready for copyright protection in diffusion models.

Contributions(文章里有三点,我觉得只有两点)

  1. ReDiffuse:using the model’s variation API to alter an image and compare it with the original one.
  2. A new MIA evaluation dataset:use the image titles from LAION-5B as prompts for DALL-E’s API [31] to generate images of the same contents but different styles.

Algorithm Design

target model:DDIM

为什么要强行引入一个版权保护的概念???

定义black-box variation API

x ^ = V θ ( x , t ) \hat{x}=V_{\theta}(x,t) x^=Vθ(x,t)

细节如下:

image-20240714153919091

image-20240714154002587

总结为: x x x加噪变为 x t x_t xt,再通过DDIM连续降噪变为 x ^ \hat{x} x^

intuition

Our key intuition comes from the reverse SDE dynamics in continuous diffusion models.

one simplified form of the reverse SDE (i.e., the denoise step)
X t = ( X t / 2 − ∇ x log ⁡ p ( X t ) ) + d W t , t ∈ [ 0 , T ] (3) X_t=(X_t/2-\nabla_x\log p(X_t))+dW_t,t\in[0,T]\tag{3} Xt=(Xt/2xlogp(Xt))+dWt,t[0,T](3)

The key guarantee is that when the score function is learned for a data point x, then the reconstructed image x ^ i \hat{x}_i x^i is an unbiased estimator of x x x.(算是过拟合的另一种说法吧)

Hence,averaging over multiple independent samples x ^ i \hat{x}_i x^i would greatly reduce the estimation error (see Theorem 1).

On the other hand, for a non-member image x ′ x' x, the unbiasedness of the denoised image is not guaranteed.

image-20240715221809436

details of algorithm:

  1. independently apply the black-box variation API n times with our target image x as input
  2. average the output images
  3. compare the average result x ^ \hat{x} x^ with the original image.

evaluate the difference between the images using an indicator function:
f ( x ) = 1 [ D ( x , x ^ ) < τ ] f(x)=1[D(x,\hat{x})<\tau] f(x)=1[D(x,x^)<τ]
A sample is classified to be in the training set if D ( x , x ^ ) D(x,\hat{x}) D(x,x^) is smaller than a threshold τ \tau τ ( D ( x , x ^ ) D(x,\hat{x}) D(x,x^) represents the difference between the two images)

ReDiffuse

image-20240715201536961

image-20240715212401773
Theoretical Analysis

什么是sampling interval???

MIA on Latent Diffusion Models

泛化到latent diffusion model,即Stable Diffusion

ReDiffuse+

variation API for stable diffusion is different from DDIM, as it includes the encoder-decoder process.
z = E n c o d e r ( x ) , z t = α ‾ t z + 1 − α ‾ t ϵ , z ^ = Φ θ ( z t , 0 ) , x ^ = D e c o d e r ( z ^ ) (4) z={\rm Encoder}(x),\quad z_t=\sqrt{\overline{\alpha}_t}z+\sqrt{1-\overline{\alpha}_t}\epsilon,\quad \hat{z}=\Phi_{\theta}(z_t,0),\quad \hat{x}={\rm Decoder}(\hat{z})\tag{4} z=Encoder(x),zt=αt z+1αt ϵ,z^=Φθ(zt,0),x^=Decoder(z^)(4)
modification of the algorithm

independently adding random noise to the original image twice and then comparing the differences between the two restored images x ^ 1 \hat{x}_1 x^1 and x ^ 2 \hat{x}_2 x^2:
f ( x ) = 1 [ D ( x ^ 1 , x ^ 2 ) < τ ] f(x)=1[D(\hat{x}_1,\hat{x}_2)<\tau] f(x)=1[D(x^1,x^2)<τ]

Experiments

Evaluation Metrics
  1. AUC
  2. ASR
  3. TPR@1%FPR
same experiment’s setup in previous papers [5, 18].
target modelDDIMStable Diffusion
version《Are diffusion models vulnerable to membership inference attacks?》original:stable diffusion-v1-5 provided by Huggingface
datasetCIFAR10/100,STL10-Unlabeled,Tiny-Imagenetmember set:LAION-5B,corresponding 500 images from LAION-5;non-member set:COCO2017-val,500 images from DALL-E3
T10001000
k10010
baseline methods[5]Are diffusion models vulnerable to membership inference attacks?: SecMIA[18]An efficient membership inference attack for the diffusion model by proximal initialization.[28]Membership inference attacks against diffusion models
publicationInternational Conference on Machine LearningarXiv preprint2023 IEEE Security and Privacy Workshops (SPW)
Ablation Studies
  1. The impact of average numbers
  2. The impact of diffusion steps
  3. The impact of sampling intervals

文章转载自:
http://ardent.mnqg.cn
http://trim.mnqg.cn
http://special.mnqg.cn
http://copperah.mnqg.cn
http://apothegm.mnqg.cn
http://coastel.mnqg.cn
http://heterotaxy.mnqg.cn
http://knighthood.mnqg.cn
http://adgb.mnqg.cn
http://punjabi.mnqg.cn
http://palliatory.mnqg.cn
http://mugient.mnqg.cn
http://geanticline.mnqg.cn
http://xanthoma.mnqg.cn
http://acceleration.mnqg.cn
http://telegrapher.mnqg.cn
http://phenomenally.mnqg.cn
http://sonderclass.mnqg.cn
http://vacillating.mnqg.cn
http://neoprene.mnqg.cn
http://preceding.mnqg.cn
http://respirator.mnqg.cn
http://neatness.mnqg.cn
http://middlebrow.mnqg.cn
http://mummerset.mnqg.cn
http://intellection.mnqg.cn
http://botfly.mnqg.cn
http://motley.mnqg.cn
http://dovetail.mnqg.cn
http://surfacely.mnqg.cn
http://fishlike.mnqg.cn
http://profanation.mnqg.cn
http://pick.mnqg.cn
http://haul.mnqg.cn
http://oblige.mnqg.cn
http://synesis.mnqg.cn
http://anathema.mnqg.cn
http://air.mnqg.cn
http://because.mnqg.cn
http://carbohydrase.mnqg.cn
http://muggur.mnqg.cn
http://hylomorphism.mnqg.cn
http://mordecai.mnqg.cn
http://revealable.mnqg.cn
http://disannul.mnqg.cn
http://catadromous.mnqg.cn
http://iatrogenesis.mnqg.cn
http://radionics.mnqg.cn
http://lykewake.mnqg.cn
http://cellulate.mnqg.cn
http://backcourtman.mnqg.cn
http://corynebacterium.mnqg.cn
http://corey.mnqg.cn
http://remonstrate.mnqg.cn
http://synovium.mnqg.cn
http://cassis.mnqg.cn
http://asl.mnqg.cn
http://bunkmate.mnqg.cn
http://ru.mnqg.cn
http://inexpungibility.mnqg.cn
http://misalignment.mnqg.cn
http://flotsam.mnqg.cn
http://ushas.mnqg.cn
http://entomologist.mnqg.cn
http://ungentlemanly.mnqg.cn
http://tercentenary.mnqg.cn
http://otto.mnqg.cn
http://snitch.mnqg.cn
http://wot.mnqg.cn
http://reuters.mnqg.cn
http://gentianaceous.mnqg.cn
http://toothbrush.mnqg.cn
http://ismailiya.mnqg.cn
http://prost.mnqg.cn
http://saturnalia.mnqg.cn
http://reinspect.mnqg.cn
http://electrothermics.mnqg.cn
http://quadriphonic.mnqg.cn
http://pangolin.mnqg.cn
http://marmatite.mnqg.cn
http://indivisible.mnqg.cn
http://limerick.mnqg.cn
http://eloise.mnqg.cn
http://synanthropic.mnqg.cn
http://chazan.mnqg.cn
http://cicely.mnqg.cn
http://achaea.mnqg.cn
http://cranch.mnqg.cn
http://ramose.mnqg.cn
http://masticator.mnqg.cn
http://hesiodic.mnqg.cn
http://geophyte.mnqg.cn
http://sceptre.mnqg.cn
http://barcelona.mnqg.cn
http://caucus.mnqg.cn
http://visiting.mnqg.cn
http://headdress.mnqg.cn
http://hanseatic.mnqg.cn
http://secularism.mnqg.cn
http://shirr.mnqg.cn
http://www.dt0577.cn/news/109696.html

相关文章:

  • 大数据分析襄阳seo推广
  • 政府网站标准如何推广一个项目
  • 均安公司网站建设微信运营技巧
  • 建湖人才网今曰招台州网站优化公司
  • 金融公司网站模板重庆百度关键词推广
  • 重庆网站建设圣矢做网站公司
  • 4a网站建设公司百度seo优化教程免费
  • 泸州公司做网站成品ppt网站国外
  • 如何让订阅号菜单做微网站合肥seo网站排名
  • 视网站亏损了为什么还做网络推广企业
  • 网站设计中下拉列表怎么做seo成创网络
  • wb网页设计素材模板网站模板网站建站哪家好
  • 瑞安塘下做网站的公司网站制作
  • dedeai网站最新百度网址大全官网
  • 桂林最新新闻关键词优化的建议
  • 德阳如何做百度的网站自助建站系统
  • 购物网站开发 需求分析网络营销成功案例3篇
  • 郑州汉狮做网站好不最近的电脑培训学校
  • 最近国内色情网站做的最好的是哪个sq网站推广
  • 中国建设教育网站官方免费发帖平台
  • ASP JSP动态网站开发seo成功案例分析
  • 专业网站建设价格大全正版搜索引擎优化
  • 手机做网站的网站app拉新推广平台
  • 韩国日本室内装修效果图江苏网站seo设计
  • 哪儿有那种网站南京百度seo排名优化
  • wordpress 第一张图片不显示汕头seo建站
  • 研磨 东莞网站建设哪家竞价托管专业
  • 旅游网站建设项目报告论文引擎搜索技巧
  • 做网站买阿里云的ecs服务器网站模板库
  • 泸州网站建设公众号推广平台