Android Malware Detection with Unbiased Confidence Guarantees Authors: Harris Papadopoulos, Nestoras Georgiou, Charalambos Eliades, Andreas Konstantinidis | Published: 2023-12-17 AlgorithmWatermarkingClass Imbalance 2023.12.17 2025.05.27 Literature Database
SAME: Sample Reconstruction against Model Extraction Attacks Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08 WatermarkingModel Performance EvaluationModel Extraction Attack 2023.12.17 2025.05.27 Literature Database
What to Remember: Self-Adaptive Continual Learning for Audio Deepfake Detection Authors: Xiaohui Zhang, Jiangyan Yi, Chenglong Wang, Chuyuan Zhang, Siding Zeng, Jianhua Tao | Published: 2023-12-15 WatermarkingDeep Fake Audio EvaluationSpeech Synthesis Technology 2023.12.15 2025.05.27 Literature Database
No-Skim: Towards Efficiency Robustness Evaluation on Skimming-based Language Models Authors: Shengyao Zhang, Mi Zhang, Xudong Pan, Min Yang | Published: 2023-12-15 | Updated: 2023-12-18 Evolution of AILLM SecurityWatermarking 2023.12.15 2025.05.27 Literature Database
Data-Free Hard-Label Robustness Stealing Attack Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12 WatermarkingRobustness EvaluationWatermark Evaluation 2023.12.10 2025.05.28 Literature Database
Beyond Gradient and Priors in Privacy Attacks: Leveraging Pooler Layer Inputs of Language Models in Federated Learning Authors: Jianwei Li, Sheng Liu, Qi Lei | Published: 2023-12-10 | Updated: 2024-03-15 WatermarkingPrivacy Protection MethodFederated Learning 2023.12.10 2025.05.28 Literature Database
SoK: Unintended Interactions among Machine Learning Defenses and Risks Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan | Published: 2023-12-07 | Updated: 2024-04-04 WatermarkingAdversarial ExampleOverfitting and Memorization 2023.12.07 2025.05.28 Literature Database
Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks Authors: Xiaobei Yan, Chip Hong Chang, Tianwei Zhang | Published: 2023-12-07 WatermarkingDefense Method 2023.12.07 2025.05.28 Literature Database
Understanding (Un)Intended Memorization in Text-to-Image Generative Models Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr | Published: 2023-12-06 Evolution of AIWatermarkingCybersecurity 2023.12.06 2025.05.28 Literature Database
When PETs misbehave: A Contextual Integrity analysis Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05 WatermarkingPrivacy ProtectionPrivacy Protection Method 2023.12.05 2025.05.28 Literature Database