Hardness of Deceptive Certificate Selection Authors: Stephan Wäldchen | Published: 2023-06-07 WatermarkingFeature Selection MethodCertificate Ratio 2023.06.07 2025.05.28 Literature Database
Human-imperceptible, Machine-recognizable Images Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao | Published: 2023-06-06 WatermarkingPrivacy Enhancing TechnologyModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
Machine Unlearning: A Survey Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu | Published: 2023-06-06 WatermarkingMembership InferenceModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14 WatermarkingPrivacy AssessmentFeature Extraction Method 2023.05.01 2025.05.28 Literature Database
C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference Authors: Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel | Published: 2023-04-26 DNN IP Protection MethodWatermarkingPrivacy Assessment 2023.04.26 2025.05.28 Literature Database
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks Authors: Isabell Lederer, Rudolf Mayer, Andreas Rauber | Published: 2023-04-22 DNN IP Protection MethodWatermarkingMembership Inference 2023.04.22 2025.05.28 Literature Database
Understanding Overfitting in Adversarial Training via Kernel Regression Authors: Teng Zhang, Kang Li | Published: 2023-04-13 | Updated: 2023-04-19 WatermarkingRobustnessRegularization 2023.04.13 2025.05.28 Literature Database
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14 DNN IP Protection MethodWatermarkingBackdoor Attack 2023.04.12 2025.05.28 Literature Database
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24 WatermarkingSecurity AnalysisPrivacy Technique 2023.04.12 2025.05.28 Literature Database
Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11 WatermarkingPrivacy AnalysisPrivacy Technique 2023.04.11 2025.05.28 Literature Database