Fingerprinting Method

CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of Large Language Models

Authors: Zhenzhen Ren, GuoBiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang | Published: 2025-05-22
LLM Security
Fingerprinting Method
Model Identification

DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection

Authors: Yuliang Yan, Haochun Tang, Shuo Yan, Enyan Dai | Published: 2025-05-22
Fingerprinting Method
Prompt Injection
Model Identification

FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition

Authors: Zhenhua Xu, Wenpeng Xing, Zhebo Wang, Chang Hu, Chen Jie, Meng Han | Published: 2024-09-13
LLM Security
Fingerprinting Method
Model Performance Evaluation

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints

Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01
Data Collection
Fingerprinting Method
Privacy Protection

Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation

Authors: Zhaoyi Lu, Wenchao Xu, Ming Tu, Xin Xie, Cunqing Hua, Nan Cheng | Published: 2024-06-11 | Updated: 2024-06-12
Watermarking
Fingerprinting Method
Signal Perturbation Method

Large Language Models as Carriers of Hidden Messages

Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05
Algorithm
Fingerprinting Method
Watermark Design

ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models

Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10
Query Generation Method
Fingerprinting Method
Prompt Injection

Locality Sensitive Hashing for Network Traffic Fingerprinting

Authors: Nowfel Mashnoor, Jay Thom, Abdur Rouf, Shamik Sengupta, Batyr Charyyev | Published: 2024-02-12
IoT Device Identification
Parameter Tuning
Fingerprinting Method

Instructional Fingerprinting of Large Language Models

Authors: Jiashu Xu, Fei Wang, Mingyu Derek Ma, Pang Wei Koh, Chaowei Xiao, Muhao Chen | Published: 2024-01-21 | Updated: 2024-04-03
Watermarking
Fingerprinting Method
Model Performance Evaluation

Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication

Authors: Hyunmin Choi, Simon Woo, Hyoungshick Kim | Published: 2023-12-18 | Updated: 2024-04-01
Watermarking
Fingerprinting Method
Privacy Protection