Watermarking

Certifiably Robust Variational Autoencoders

Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23
Watermarking
Data Generation
Model Architecture

Perceptually Constrained Adversarial Attacks

Authors: Muhammad Zaid Hameed, Andras Gyorgy | Published: 2021-02-14
Watermarking
Attack Method
Adversarial Training

Private Prediction Sets

Authors: Anastasios N. Angelopoulos, Stephen Bates, Tijana Zrnic, Michael I. Jordan | Published: 2021-02-11 | Updated: 2024-03-03
Watermarking
Data Protection Method
Difficulty Calibration

Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack

Authors: Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang | Published: 2021-02-08 | Updated: 2021-03-01
Watermarking
Data Protection Method
Model Performance Evaluation

Efficient Certified Defenses Against Patch Attacks on Image Classifiers

Authors: Jan Hendrik Metzen, Maksym Yatsura | Published: 2021-02-08
Watermarking
Model Architecture
Adversarial Training

TAD: Trigger Approximation based Black-box Trojan Detection for AI

Authors: Xinqiao Zhang, Huili Chen, Farinaz Koushanfar | Published: 2021-02-03 | Updated: 2021-04-20
Watermarking
Trojan Detection
Backdoor Attack

Symmetric Sparse Boolean Matrix Factorization and Applications

Authors: Sitan Chen, Zhao Song, Runzhou Tao, Ruizhe Zhang | Published: 2021-02-02 | Updated: 2022-01-13
Watermarking
Data Generation
Linear Independence

Meta Adversarial Training against Universal Patches

Authors: Jan Hendrik Metzen, Nicole Finnie, Robin Hutmacher | Published: 2021-01-27 | Updated: 2021-06-22
Watermarking
Meta-Learning Method
Adversarial Training

Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants

Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18
Watermarking
Dataset evaluation
Training Data Extraction Method

InstaHide’s Sample Complexity When Mixing Two Private Images

Authors: Baihe Huang, Zhao Song, Runzhou Tao, Junze Yin, Ruizhe Zhang, Danyang Zhuo | Published: 2020-11-24 | Updated: 2024-02-06
Watermarking
Data Privacy Assessment
Structural Learning