Another post from March 2025 trying to remind folks about what img2img is.
Another post from March 2025 trying to remind folks about what img2img is.
I (Ben) was thrilled to testify on the technical side, demonstrating with algorithms, real code and benchmarks on why data privacy is possible at scale. Sharing that room with Danny Lin, Jason George, and so so many talented and skilled creatives was a genuine honor.
I (Ben) was thrilled to testify on the technical side, demonstrating with algorithms, real code and benchmarks on why data privacy is possible at scale. Sharing that room with Danny Lin, Jason George, and so so many talented and skilled creatives was a genuine honor.
1. Hemlock was presented at CCS in Oct. We are working on releasing a usable tool in coming weeks.
2. Our next paper is peer-reviewed & accepted by USENIX Security 2026. It is a Model Provenance tool that computes "feature fingerprints" from genAI image models.
1. Hemlock was presented at CCS in Oct. We are working on releasing a usable tool in coming weeks.
2. Our next paper is peer-reviewed & accepted by USENIX Security 2026. It is a Model Provenance tool that computes "feature fingerprints" from genAI image models.