GaussMark: A Practical Approach for Structural Watermarking of Language Models Authors: Adam Block, Ayush Sekhari, Alexander Rakhlin | Published: 2025-01-17 WatermarkingHypothesis TestingExperimental Validation 2025.01.17 2025.05.27 Literature Database
Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering Authors: Matteo Esposito | Published: 2025-01-09 Hypothesis TestingDefect Prediction Dataset CreationVulnerability Management 2025.01.09 2025.05.27 Literature Database
A Statistical Hypothesis Testing Framework for Data Misappropriation Detection in Large Language Models Authors: Yinpeng Cai, Lexin Li, Linjun Zhang | Published: 2025-01-05 FrameworkHypothesis TestingWatermark Evaluation 2025.01.05 2025.05.27 Literature Database
Robust Kernel Hypothesis Testing under Data Corruption Authors: Antonin Schrab, Ilmun Kim | Published: 2024-05-30 Data Privacy AssessmentData Protection MethodHypothesis Testing 2024.05.30 2025.05.27 Literature Database
How Much Does Each Datapoint Leak Your Privacy? Quantifying the Per-datum Membership Leakage Authors: Achraf Azize, Debabrota Basu | Published: 2024-02-15 Membership InferenceHypothesis TestingWatermark Evaluation 2024.02.15 2025.05.27 Literature Database
Gaussian Membership Inference Privacy Authors: Tobias Leemann, Martin Pawelczyk, Gjergji Kasneci | Published: 2023-06-12 | Updated: 2023-10-26 Privacy TechniqueHypothesis TestingStatistical Testing 2023.06.12 2025.05.28 Literature Database
Approximate Data Deletion in Generative Models Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29 Algorithm DesignData LeakageHypothesis Testing 2022.06.29 2025.05.28 Literature Database
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti | Published: 2021-10-28 Fingerprinting MethodHypothesis TestingWireless Channel Detection 2021.10.28 2025.05.28 Literature Database