1CISPA Helmholtz Center for Information Security 2Max Planck Institute for Informatics 3University of Maryland, College Park
An overview of the proposed framework. The framework takes two steps to reuse GANs: (a) train a proxy model to distill information from pre-trained models, circumventing accessing the gradients of pre-trained models; (b) identify and iteratively traverse a non-linear trajectory under the guidance of gradients.
@inproceedings{wang2021hijack,
title={Hijack-GAN: Unintended-Use of Pretrained, Black-Box GANs},
author={Wang, Hui-Po and Yu, Ning and Fritz, Mario},
booktitle={IEEE Conference on Computer Vision and Pattern Recognition (CVPR)},
year={2021}
}