no code implementations • 15 Mar 2024 • YuXuan Li, Sarthak Kumar Maharana, Yunhui Guo
Unfortunately, existing methodologies based on trigger sets are still susceptible to functionality-stealing attacks, potentially enabling adversaries to steal the functionality of the source model without a reliable means of verifying ownership.
no code implementations • 15 Mar 2024 • Sarthak Kumar Maharana, Baoming Zhang, Yunhui Guo
Real-world vision models in dynamic environments face rapid shifts in domain distributions, leading to decreased recognition performance.
no code implementations • 3 Sep 2023 • Sarthak Kumar Maharana, Krishna Kamal Adidam, Shoumik Nandi, Ajitesh Srivastava
We demonstrate the impact of different pre-trained features on this challenging AAI task, at low-resource conditions.