FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model Authors: Shuo Shao, Wenyuan Yang, Hanlin Gu, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren | Published: 2022-11-14 | Updated: 2024-03-02 DNN IP Protection MethodWatermarkingMalicious Client 2022.11.14 2025.05.28 Literature Database
Unlearning Graph Classifiers with Limited Data Resources Authors: Chao Pan, Eli Chien, Olgica Milenkovic | Published: 2022-11-06 | Updated: 2023-07-01 Graph Neural NetworkWatermarkingPrivacy Protection Method 2022.11.06 2025.05.28 Literature Database
Unclonability and Quantum Cryptanalysis: From Foundations to Applications Authors: Mina Doosti | Published: 2022-10-31 WatermarkingCryptographyQuantum Information and Quantum Computing 2022.10.31 2025.05.28 Literature Database
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants Authors: James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen | Published: 2022-10-25 WatermarkingDynamic AnalysisAdversarial Training 2022.10.25 2025.05.28 Literature Database
Towards Adversarial Purification using Denoising AutoEncoders Authors: Dvij Kalaria, Aritra Hazra, Partha Pratim Chakrabarti | Published: 2022-08-29 DNN IP Protection MethodWatermarkingAdaptive Retraining Mechanism 2022.08.29 2025.05.28 Literature Database
Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection Authors: Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva | Published: 2022-04-27 WatermarkingPhishing AttackVisual Similarity Detection 2022.04.27 2025.05.28 Literature Database
SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02 WatermarkingPrivacy ProtectionPrivacy Protection in Machine Learning 2022.04.11 2025.05.28 Literature Database
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31 WatermarkingMembership InferenceDefense Method 2022.01.27 2025.05.28 Literature Database
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01 WatermarkingComputational EfficiencyDefense Mechanism 2021.09.01 2025.05.28 Literature Database
Wavelet Selection and Employment for Side-Channel Disassembly Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25 WatermarkingTime-Frequency Analysisevaluation metrics 2021.07.25 2025.05.28 Literature Database