Optimizing Adaptive Attacks against Content Watermarks for Language Models Authors: Abdulrahman Diaa, Toluwani Aremu, Nils Lukas | Published: 2024-10-03 LLM SecurityWatermarkingPrompt Injection 2024.10.03 2025.05.12 Literature Database
A Watermark for Black-Box Language Models Authors: Dara Bahri, John Wieting, Dana Alon, Donald Metzler | Published: 2024-10-02 LLM Performance EvaluationWatermarkingWatermark Evaluation 2024.10.02 2025.05.12 Literature Database
Inspection and Control of Self-Generated-Text Recognition Ability in Llama3-8b-Instruct Authors: Christopher Ackerman, Nina Panickssery | Published: 2024-10-02 | Updated: 2025-01-25 Identification of AI OutputPrompting StrategySelf-Aware Model 2024.10.02 2025.05.12 Literature Database
Impact of White-Box Adversarial Attacks on Convolutional Neural Networks Authors: Rakesh Podder, Sudipto Ghosh | Published: 2024-10-02 Model Performance EvaluationAttack MethodAdversarial Example 2024.10.02 2025.05.12 Literature Database
Adaptively Private Next-Token Prediction of Large Language Models Authors: James Flemings, Meisam Razaviyayn, Murali Annavaram | Published: 2024-10-02 Privacy ProtectionPrivacy Protection MethodPrivacy Technique 2024.10.02 2025.05.12 Literature Database
Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking Authors: Aakash Varma Nadimpalli, Ajita Rattani | Published: 2024-10-02 WatermarkingWatermark RobustnessWatermark Evaluation 2024.10.02 2025.05.12 Literature Database
On Using Certified Training towards Empirical Robustness Authors: Alessandro De Palma, Serge Durand, Zakaria Chihani, François Terrier, Caterina Urban | Published: 2024-10-02 | Updated: 2025-03-24 Adversarial ExampleRegularization 2024.10.02 2025.05.12 Literature Database
Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security Authors: Mona Esmaeili, Morteza Rahimi, Hadise Pishdast, Dorsa Farahmandazad, Matin Khajavi, Hadi Jabbari Saray | Published: 2024-10-01 | Updated: 2024-10-06 CybersecurityNetwork Threat Detection 2024.10.01 2025.05.12 Literature Database
Empirical Perturbation Analysis of Linear System Solvers from a Data Poisoning Perspective Authors: Yixin Liu, Arielle Carr, Lichao Sun | Published: 2024-10-01 Backdoor AttackPoisoningLinear Solver 2024.10.01 2025.05.12 Literature Database
Timber! Poisoning Decision Trees Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01 Backdoor AttackPoisoning 2024.10.01 2025.05.12 Literature Database