Certifiably Robust Variational Autoencoders Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23 WatermarkingData GenerationModel Architecture 2021.02.15 2025.05.28 Literature Database
Perceptually Constrained Adversarial Attacks Authors: Muhammad Zaid Hameed, Andras Gyorgy | Published: 2021-02-14 WatermarkingAttack MethodAdversarial Training 2021.02.14 2025.05.28 Literature Database
Private Prediction Sets Authors: Anastasios N. Angelopoulos, Stephen Bates, Tijana Zrnic, Michael I. Jordan | Published: 2021-02-11 | Updated: 2024-03-03 WatermarkingData Protection MethodDifficulty Calibration 2021.02.11 2025.05.28 Literature Database
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack Authors: Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang | Published: 2021-02-08 | Updated: 2021-03-01 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.08 2025.05.28 Literature Database
Efficient Certified Defenses Against Patch Attacks on Image Classifiers Authors: Jan Hendrik Metzen, Maksym Yatsura | Published: 2021-02-08 WatermarkingModel ArchitectureAdversarial Training 2021.02.08 2025.05.28 Literature Database
TAD: Trigger Approximation based Black-box Trojan Detection for AI Authors: Xinqiao Zhang, Huili Chen, Farinaz Koushanfar | Published: 2021-02-03 | Updated: 2021-04-20 WatermarkingTrojan DetectionBackdoor Attack 2021.02.03 2025.05.28 Literature Database
Symmetric Sparse Boolean Matrix Factorization and Applications Authors: Sitan Chen, Zhao Song, Runzhou Tao, Ruizhe Zhang | Published: 2021-02-02 | Updated: 2022-01-13 WatermarkingData GenerationLinear Independence 2021.02.02 2025.05.28 Literature Database
Meta Adversarial Training against Universal Patches Authors: Jan Hendrik Metzen, Nicole Finnie, Robin Hutmacher | Published: 2021-01-27 | Updated: 2021-06-22 WatermarkingMeta-Learning MethodAdversarial Training 2021.01.27 2025.05.28 Literature Database
Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18 WatermarkingDataset evaluationTraining Data Extraction Method 2020.12.18 2025.05.28 Literature Database
InstaHide’s Sample Complexity When Mixing Two Private Images Authors: Baihe Huang, Zhao Song, Runzhou Tao, Junze Yin, Ruizhe Zhang, Danyang Zhuo | Published: 2020-11-24 | Updated: 2024-02-06 WatermarkingData Privacy AssessmentStructural Learning 2020.11.24 2025.05.28 Literature Database