Literature Database

DetectGPT: Zero-Shot Machine-Generated Text Detection using Probability Curvature

Authors: Eric Mitchell, Yoonho Lee, Alexander Khazatsky, Christopher D. Manning, Chelsea Finn | Published: 2023-01-26 | Updated: 2023-07-23
Identification of AI Output
Text Perturbation Method
Deep Learning Method

Beware of the Unexpected: Bimodal Taint Analysis

Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25
Software Security
Program Analysis
Vulnerability Management

Motion ID: Human Authentication Approach

Authors: Aleksei Gavron, Konstantin Belev, Konstantin Kudelkin, Vladislav Shikhov, Andrey Akushevich, Alexey Fartukov, Vladimir Paramonov, Dmitry Syromolotov, Artem Makoyan | Published: 2023-01-25
Data Collection
User Education
User Activity Analysis

A Watermark for Large Language Models

Authors: John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, Tom Goldstein | Published: 2023-01-24 | Updated: 2024-05-01
Watermarking
Prompt Injection
Analysis of Detection Methods

DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2023-01-23
DNN IP Protection Method
Watermarking
Analysis of Detection Methods

Backdoor Attacks in Peer-to-Peer Federated Learning

Authors: Georgios Syros, Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea | Published: 2023-01-23 | Updated: 2024-09-17
Backdoor Attack
Poisoning
Classification of Malicious Actors

Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning

Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20
DNN IP Protection Method
Integration of FL and HE
Privacy Enhancing Technology

Towards Understanding How Self-training Tolerates Data Backdoor Poisoning

Authors: Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu | Published: 2023-01-20
Backdoor Attack
Poisoning
Self-Learning Method

On the Vulnerability of Backdoor Defenses for Federated Learning

Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19
DNN IP Protection Method
Poisoning
Feature Importance Analysis

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13
Privacy Enhancing Technology
User Authentication System
Self-Attention Mechanism