AI Model Disgorgement: Methods and Choices Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07 DNN IP Protection MethodWatermarkingData Generation 2023.04.07 2025.05.28 Literature Database
When approximate design for fast homomorphic computation provides differential privacy guarantees Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06 WatermarkingPrivacy Enhancing TechnologyMachine Learning Method 2023.04.06 2025.05.28 Literature Database
Leveraging Deep Learning Approaches for Deepfake Detection: A Review Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04 WatermarkingModel SelectionMachine Learning Method 2023.04.04 2025.05.28 Literature Database
Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02 WatermarkingSoftware SecurityVulnerability Analysis 2023.02.24 2025.05.28 Literature Database
On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space Authors: Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu | Published: 2023-02-23 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.23 2025.05.28 Literature Database
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06 DNN IP Protection MethodWatermarkingVulnerability detection 2023.02.22 2025.05.28 Literature Database
Generalization Bounds for Adversarial Contrastive Learning Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21 WatermarkingModel Performance EvaluationAdversarial Example 2023.02.21 2025.05.28 Literature Database
Certified private data release for sparse Lipschitz functions Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28 WatermarkingPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.19 2025.05.28 Literature Database
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation Authors: Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, Nam Sung Kim, Josep Torrellas | Published: 2023-02-03 | Updated: 2023-10-14 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.03 2025.05.28 Literature Database
Deep Learning model integrity checking mechanism using watermarking technique Authors: Shahinul Hoque, Farhin Farhad Riya, Yingyuan Yang, Jinyuan Sun | Published: 2023-01-29 | Updated: 2025-03-21 DNN IP Protection MethodWatermarkingModel Architecture 2023.01.29 2025.05.28 Literature Database