Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy Authors: Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding, Khaled B. Letaief | Published: 2024-02-16 Privacy Protection MethodFairness evaluationInformation Hiding Techniques 2024.02.16 2025.05.27 Literature Database
A Robust Semantics-based Watermark for Large Language Model against Paraphrasing Authors: Jie Ren, Han Xu, Yiding Liu, Yingqian Cui, Shuaiqiang Wang, Dawei Yin, Jiliang Tang | Published: 2023-11-15 | Updated: 2024-04-01 Prompt InjectionRobustness EvaluationInformation Hiding Techniques 2023.11.15 2025.05.28 Literature Database
Differentially Private Multi-Site Treatment Effect Estimation Authors: Tatsuki Koga, Kamalika Chaudhuri, David Page | Published: 2023-10-10 Privacy ClassificationPerformance EvaluationInformation Hiding Techniques 2023.10.10 2025.05.28 Literature Database
Steganographic Capacity of Deep Learning Models Authors: Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp | Published: 2023-06-25 Data ObfuscationMalware ClassificationInformation Hiding Techniques 2023.06.25 2025.05.28 Literature Database
Towards Automated Classification of Attackers’ TTPs by combining NLP with ML Techniques Authors: Clemens Sauerwein, Alexander Pfohl | Published: 2022-07-18 Text Extraction MethodTraining Data GenerationInformation Hiding Techniques 2022.07.18 2025.05.28 Literature Database
Imitation Privacy Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30 Data GenerationInformation Hiding TechniquesAdversarial attack 2020.08.30 2025.05.28 Literature Database
Forgetting Outside the Box: Scrubbing Deep Networks of Information Accessible from Input-Output Observations Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2020-03-05 | Updated: 2020-10-29 Machine learningInformation Hiding TechniquesDeep Learning Method 2020.03.05 2025.05.28 Literature Database
CycleGAN, a Master of Steganography Authors: Casey Chu, Andrey Zhmoginov, Mark Sandler | Published: 2017-12-08 | Updated: 2017-12-16 Certified RobustnessInformation Hiding TechniquesGenerative Adversarial Network 2017.12.08 2025.05.28 Literature Database