CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of Large Language Models Authors: Zhenzhen Ren, GuoBiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang | Published: 2025-05-22 LLM SecurityFingerprinting MethodModel Identification 2025.05.22 2025.05.28 Literature Database
DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection Authors: Yuliang Yan, Haochun Tang, Shuo Yan, Enyan Dai | Published: 2025-05-22 Fingerprinting MethodPrompt InjectionModel Identification 2025.05.22 2025.05.28 Literature Database
FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition Authors: Zhenhua Xu, Wenpeng Xing, Zhebo Wang, Chang Hu, Chen Jie, Meng Han | Published: 2024-09-13 LLM SecurityFingerprinting MethodModel Performance Evaluation 2024.09.13 2025.05.27 Literature Database
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01 Data CollectionFingerprinting MethodPrivacy Protection 2024.09.01 2025.05.27 Literature Database
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation Authors: Zhaoyi Lu, Wenchao Xu, Ming Tu, Xin Xie, Cunqing Hua, Nan Cheng | Published: 2024-06-11 | Updated: 2024-06-12 WatermarkingFingerprinting MethodSignal Perturbation Method 2024.06.11 2025.05.27 Literature Database
Large Language Models as Carriers of Hidden Messages Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05 AlgorithmFingerprinting MethodWatermark Design 2024.06.04 2025.05.27 Literature Database
ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10 Query Generation MethodFingerprinting MethodPrompt Injection 2024.05.03 2025.05.27 Literature Database
Locality Sensitive Hashing for Network Traffic Fingerprinting Authors: Nowfel Mashnoor, Jay Thom, Abdur Rouf, Shamik Sengupta, Batyr Charyyev | Published: 2024-02-12 IoT Device IdentificationParameter TuningFingerprinting Method 2024.02.12 2025.05.27 Literature Database
Instructional Fingerprinting of Large Language Models Authors: Jiashu Xu, Fei Wang, Mingyu Derek Ma, Pang Wei Koh, Chaowei Xiao, Muhao Chen | Published: 2024-01-21 | Updated: 2024-04-03 WatermarkingFingerprinting MethodModel Performance Evaluation 2024.01.21 2025.05.27 Literature Database
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication Authors: Hyunmin Choi, Simon Woo, Hyoungshick Kim | Published: 2023-12-18 | Updated: 2024-04-01 WatermarkingFingerprinting MethodPrivacy Protection 2023.12.18 2025.05.27 Literature Database