Skip to main content

Showing 1–8 of 8 results for author: Lorenz, P

  1. arXiv:2406.15104  [pdf, other

    cs.CR cs.CV

    Deciphering the Definition of Adversarial Robustness for post-hoc OOD Detectors

    Authors: Peter Lorenz, Mario Fernandez, Jens Müller, Ullrich Köthe

    Abstract: Detecting out-of-distribution (OOD) inputs is critical for safely deploying deep learning models in real-world scenarios. In recent years, many OOD detectors have been developed, and even the benchmarking has been standardized, i.e. OpenOOD. The number of post-hoc detectors is growing fast and showing an option to protect a pre-trained classifier against natural distribution shifts, claiming to be… ▽ More

    Submitted 28 June, 2024; v1 submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2401.06637  [pdf, other

    cs.CV cs.CR

    Adversarial Examples are Misaligned in Diffusion Model Manifolds

    Authors: Peter Lorenz, Ricard Durall, Janis Keuper

    Abstract: In recent years, diffusion models (DMs) have drawn significant attention for their success in approximating data distributions, yielding state-of-the-art generative results. Nevertheless, the versatility of these models extends beyond their generative capabilities to encompass various vision applications, such as image inpainting, segmentation, adversarial robustness, among others. This study is d… ▽ More

    Submitted 16 March, 2024; v1 submitted 12 January, 2024; originally announced January 2024.

    Comments: accepted at IJCNN

  3. arXiv:2307.02347   

    cs.CV cs.CR

    Detecting Images Generated by Deep Diffusion Models using their Local Intrinsic Dimensionality

    Authors: Peter Lorenz, Ricard Durall, Janis Keuper

    Abstract: Diffusion models recently have been successfully applied for the visual synthesis of strikingly realistic appearing images. This raises strong concerns about their potential for malicious purposes. In this paper, we propose using the lightweight multi Local Intrinsic Dimensionality (multiLID), which has been originally developed in context of the detection of adversarial examples, for the automati… ▽ More

    Submitted 28 September, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: We have a serious bug and the method is not that good as thought. We need to withraw it totally

  4. arXiv:2212.06776  [pdf, other

    cs.CV cs.CR

    Unfolding Local Growth Rate Estimates for (Almost) Perfect Adversarial Detection

    Authors: Peter Lorenz, Margret Keuper, Janis Keuper

    Abstract: Convolutional neural networks (CNN) define the state-of-the-art solution on many perceptual tasks. However, current CNN approaches largely remain vulnerable against adversarial perturbations of the input that have been crafted specifically to fool the system while being quasi-imperceptible to the human eye. In recent years, various approaches have been proposed to defend CNNs against such attacks,… ▽ More

    Submitted 1 March, 2024; v1 submitted 13 December, 2022; originally announced December 2022.

    Comments: accepted at VISAPP23

  5. arXiv:2210.06284  [pdf, other

    cs.CV cs.CR cs.LG

    Visual Prompting for Adversarial Robustness

    Authors: Aochuan Chen, Peter Lorenz, Yuguang Yao, Pin-Yu Chen, Sijia Liu

    Abstract: In this work, we leverage visual prompting (VP) to improve adversarial robustness of a fixed, pre-trained model at testing time. Compared to conventional adversarial defenses, VP allows us to design universal (i.e., data-agnostic) input prompting templates, which have plug-and-play capabilities at testing time to achieve desired model performance without introducing much computation overhead. Alth… ▽ More

    Submitted 30 April, 2023; v1 submitted 12 October, 2022; originally announced October 2022.

    Comments: ICASSP 2023

  6. arXiv:2112.01601  [pdf, other

    cs.CV cs.CR

    Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?

    Authors: Peter Lorenz, Dominik Strassel, Margret Keuper, Janis Keuper

    Abstract: Recently, RobustBench (Croce et al. 2020) has become a widely recognized benchmark for the adversarial robustness of image classification networks. In its most commonly reported sub-task, RobustBench evaluates and ranks the adversarial robustness of trained neural networks on CIFAR10 under AutoAttack (Croce and Hein 2020b) with l-inf perturbations limited to eps = 8/255. With leading scores of the… ▽ More

    Submitted 20 February, 2024; v1 submitted 2 December, 2021; originally announced December 2021.

    Comments: AAAI-22 AdvML Workshop

  7. arXiv:2111.08785  [pdf, ps, other

    cs.CV cs.CR

    Detecting AutoAttack Perturbations in the Frequency Domain

    Authors: Peter Lorenz, Paula Harder, Dominik Strassel, Margret Keuper, Janis Keuper

    Abstract: Recently, adversarial attacks on image classification networks by the AutoAttack (Croce and Hein, 2020b) framework have drawn a lot of attention. While AutoAttack has shown a very high attack success rate, most defense approaches are focusing on network hardening and robustness enhancements, like adversarial training. This way, the currently best-reported method can withstand about 66% of adversar… ▽ More

    Submitted 20 February, 2024; v1 submitted 16 November, 2021; originally announced November 2021.

    Comments: accepted at ICML 2021 workshop for robustness

  8. arXiv:1909.07749  [pdf

    cs.NI eess.SP

    Autonomous Energy Management system achieving piezoelectric energy harvesting in Wireless Sensors

    Authors: Sara Kassan, Jaafar Gaber, Pascal Lorenz

    Abstract: Wireless Sensor Networks (WSNs) are extensively used in monitoring applications such as humidity and temperature sensing in smart buildings, industrial automation, and predicting crop health. Sensor nodes are deployed in remote places to sense the data information from the environment and to transmit the sensing data to the Base Station (BS). When a sensor is drained of energy, it can no longer ac… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Journal ref: Journal on Mobile Networks and Applications (MONET), 2019