EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection Authors: Xin Mu, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, Yue Yu | Published: 2023-12-19 WatermarkingModel Performance EvaluationWatermark Robustness 2023.12.19 2025.05.27 Literature Database
SAME: Sample Reconstruction against Model Extraction Attacks Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08 WatermarkingModel Performance EvaluationModel Extraction Attack 2023.12.17 2025.05.27 Literature Database
Forcing Generative Models to Degenerate Ones: The Power of Data Poisoning Attacks Authors: Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Ling Cai, Nathalie Baracaldo | Published: 2023-12-07 LLM SecurityPoisoning AttackModel Performance Evaluation 2023.12.07 2025.05.28 Literature Database
A Unified Hardware-based Threat Detector for AI Accelerators Authors: Xiaobei Yan, Han Qiu, Tianwei Zhang | Published: 2023-11-28 FPGACybersecurityModel Performance Evaluation 2023.11.28 2025.05.28 Literature Database
Continuous Authentication Using Mouse Clickstream Data Analysis Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23 Model Performance EvaluationUser Authentication SystemWatermark Evaluation 2023.11.23 2025.05.28 Literature Database
IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-10-17 Model Performance EvaluationTime-Related FeaturesFeature Selection Method 2023.10.17 2025.05.27 Literature Database
Demystifying Poisoning Backdoor Attacks from a Statistical Perspective Authors: Ganghua Wang, Xun Xian, Jayanth Srinivasa, Ashish Kundu, Xuan Bi, Mingyi Hong, Jie Ding | Published: 2023-10-16 | Updated: 2023-10-18 PoisoningModel Performance EvaluationConvergence Property 2023.10.16 2025.05.28 Literature Database
A Comprehensive Study of Privacy Risks in Curriculum Learning Authors: Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li | Published: 2023-10-16 Membership InferenceModel Performance EvaluationAttack Method 2023.10.16 2025.05.28 Literature Database
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis Authors: Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin | Published: 2023-10-02 DoS MitigationStacking ModelModel Performance Evaluation 2023.10.02 2025.05.28 Literature Database
Unbiased Watermark for Large Language Models Authors: Zhengmian Hu, Lichang Chen, Xidong Wu, Yihan Wu, Hongyang Zhang, Heng Huang | Published: 2023-09-22 | Updated: 2023-10-18 WatermarkingModel Performance EvaluationStatistical Hypothesis Testing 2023.09.22 2025.05.28 Literature Database