Watermarking

Breaking Speaker Recognition with PaddingBack

Authors: Zhe Ye, Diqun Yan, Li Dong, Kailai Shen | Published: 2023-08-08 | Updated: 2024-03-11
Watermarking
Backdoor Attack
Poisoning

Labeling without Seeing? Blind Annotation for Privacy-Preserving Entity Resolution

Authors: Yixiang Yao, Weizhao Jin, Srivatsan Ravi | Published: 2023-08-07
Watermarking
Data Protection Method
Cryptography

When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection

Authors: Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux | Published: 2023-08-07
Watermarking
Data Protection Method
Poisoning

Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing

Authors: Wai Man Si, Michael Backes, Yang Zhang | Published: 2023-08-07
Watermarking
Prompt Injection
Challenges of Generative Models

PURL: Safe and Effective Sanitization of Link Decoration

Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby | Published: 2023-08-07 | Updated: 2024-03-06
Watermarking
Data Protection Method
Data Collection

GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis

Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu | Published: 2023-08-07 | Updated: 2024-05-06
Watermarking
Vulnerability detection
Static Analysis

Global Differential Privacy for Distributed Metaverse Healthcare Systems

Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20
Watermarking
Data Protection Method
Machine Learning Method

DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales

Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09
Watermarking
Cyber Attack
Digital Twin

Machine Learning in Digital Forensics: A Systematic Literature Review

Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08
Watermarking
Data Extraction and Analysis
Image Forensics

Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks

Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13
Watermarking
Energy Management
Attack Evaluation