BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01 WatermarkingAttack MethodAdversarial Example 2024.04.08 2025.05.27 Literature Database
Advances in Differential Privacy and Differentially Private Machine Learning Authors: Saswat Das, Subhankar Mishra | Published: 2024-04-06 WatermarkingData Privacy AssessmentPrivacy Protection Method 2024.04.06 2025.05.27 Literature Database
Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen | Published: 2024-04-05 WatermarkingModel Performance EvaluationAdversarial Example 2024.04.05 2025.05.27 Literature Database
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning Authors: Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue | Published: 2024-04-04 WatermarkingMembership InferenceLabel Inference Attack 2024.04.04 2025.05.27 Literature Database
Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07 WatermarkingModel Performance EvaluationComputational Efficiency 2024.04.04 2025.05.27 Literature Database
LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04 WatermarkingSecurity AnalysisAnomaly Detection Method 2024.04.03 2025.05.27 Literature Database
Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03 WatermarkingPhysical layer securityWatermark Evaluation 2024.04.03 2025.05.27 Literature Database
Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial Attack Authors: Ying Zhou, Ben He, Le Sun | Published: 2024-04-02 LLM SecurityWatermarkingAttack Method 2024.04.02 2025.05.27 Literature Database
AAA: an Adaptive Mechanism for Locally Differential Private Mean Estimation Authors: Fei Wei, Ergute Bao, Xiaokui Xiao, Yin Yang, Bolin Ding | Published: 2024-04-02 | Updated: 2024-04-03 WatermarkingPrivacy Protection MethodOptimization Problem 2024.04.02 2025.05.27 Literature Database
Deciphering the Interplay between Local Differential Privacy, Average Bayesian Privacy, and Maximum Bayesian Privacy Authors: Xiaojin Zhang, Yulin Fei, Wei Chen | Published: 2024-03-25 | Updated: 2024-04-02 WatermarkingPrivacy Protection MethodPrivacy Classification 2024.03.25 2025.05.27 Literature Database