WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22 WatermarkingWatermark RobustnessWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
Geometry-Aware Instrumental Variable Regression Authors: Heiner Kremer, Bernhard Schölkopf | Published: 2024-05-19 WatermarkingOptimization ProblemEvaluation Method 2024.05.19 2025.05.27 Literature Database
SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman | Published: 2024-05-17 WatermarkingImage Feature ExtractionAgricultural Data Privacy 2024.05.17 2025.05.27 Literature Database
The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks Authors: Ziquan Liu, Yufei Cui, Yan Yan, Yi Xu, Xiangyang Ji, Xue Liu, Antoni B. Chan | Published: 2024-05-14 WatermarkingQuantification of UncertaintyAdversarial Training 2024.05.14 2025.05.27 Literature Database
Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security Authors: Leroy Jacob Valencia | Published: 2024-05-09 WatermarkingCybersecurityCompliance with Ethical Guidelines 2024.05.09 2025.05.27 Literature Database
Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models Authors: Yang Bai, Ge Pei, Jindong Gu, Yong Yang, Xingjun Ma | Published: 2024-05-09 | Updated: 2024-05-20 LLM SecurityWatermarkingWeapon Ownership 2024.05.09 2025.05.27 Literature Database
Revisiting Character-level Adversarial Attacks for Language Models Authors: Elias Abad Rocamora, Yongtao Wu, Fanghui Liu, Grigorios G. Chrysos, Volkan Cevher | Published: 2024-05-07 | Updated: 2024-09-04 WatermarkingLoss FunctionAttack Method 2024.05.07 2025.05.27 Literature Database
Differentially Private Post-Processing for Fair Regression Authors: Ruicheng Xian, Qiaobo Li, Gautam Kamath, Han Zhao | Published: 2024-05-07 WatermarkingPrivacy Protection MethodFairness evaluation 2024.05.07 2025.05.27 Literature Database
Locally Differentially Private In-Context Learning Authors: Chunyan Zheng, Keke Sun, Wenhao Zhao, Haibo Zhou, Lixin Jiang, Shaoyang Song, Chunlai Zhou | Published: 2024-05-07 | Updated: 2024-05-08 WatermarkingPrivacy Protection MethodPrompt Injection 2024.05.07 2025.05.27 Literature Database
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack Authors: Kaiyi Pang, Tao Qi, Chuhan Wu, Minhao Bai, Minghu Jiang, Yongfeng Huang | Published: 2024-05-03 | Updated: 2025-01-12 WatermarkingPrompt InjectionWatermark Evaluation 2024.05.03 2025.05.27 Literature Database