Data Obfuscation

Infecting Generative AI With Viruses

Authors: David Noever, Forrest McKee | Published: 2025-01-09
Cybersecurity
Data Obfuscation
Malware Classification

Shifting-Merging: Secure, High-Capacity and Efficient Steganography via Large Language Models

Authors: Minhao Bai, Jinshuai Yang, Kaiyi Pang, Yongfeng Huang, Yue Gao | Published: 2025-01-01
LLM Performance Evaluation
Data Obfuscation

Security Concerns in Quantum Machine Learning as a Service

Authors: Satwik Kundu, Swaroop Ghosh | Published: 2024-08-18
Cybersecurity
Data Obfuscation
Quantum Framework

Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2024-06-07
DDoS Attack Detection
Data Obfuscation
Packet Interaction

Evading Data Contamination Detection for Language Models is (too) Easy

Authors: Jasper Dekoninck, Mark Niklas Müller, Maximilian Baader, Marc Fischer, Martin Vechev | Published: 2024-02-05 | Updated: 2024-02-12
Data Obfuscation
Data Contamination Detection
Classification of Malicious Actors

De-identification of clinical free text using natural language processing: A systematic review of current approaches

Authors: Aleksandar Kovačević, Bojana Bašaragin, Nikola Milošević, Goran Nenadić | Published: 2023-11-28
Watermarking
Data Obfuscation
Watermarking Settings for Medical Data

Rethinking Backdoor Attacks

Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry | Published: 2023-07-19
Data Obfuscation
Backdoor Attack
Poisoning

Differentially Private Clustering in Data Streams

Authors: Alessandro Epasto, Tamalika Mukherjee, Peilin Zhong | Published: 2023-07-14 | Updated: 2024-01-08
Algorithm Design
Scalability Analysis
Data Obfuscation

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08
Algorithm Design
Security Assurance
Data Obfuscation

Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning

Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04
Algorithm Design
Dataset Generation
Data Obfuscation