Information Hiding Techniques

Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy

Authors: Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding, Khaled B. Letaief | Published: 2024-02-16
Privacy Protection Method
Fairness evaluation
Information Hiding Techniques

A Robust Semantics-based Watermark for Large Language Model against Paraphrasing

Authors: Jie Ren, Han Xu, Yiding Liu, Yingqian Cui, Shuaiqiang Wang, Dawei Yin, Jiliang Tang | Published: 2023-11-15 | Updated: 2024-04-01
Prompt Injection
Robustness Evaluation
Information Hiding Techniques

Differentially Private Multi-Site Treatment Effect Estimation

Authors: Tatsuki Koga, Kamalika Chaudhuri, David Page | Published: 2023-10-10
Privacy Classification
Performance Evaluation
Information Hiding Techniques

Steganographic Capacity of Deep Learning Models

Authors: Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp | Published: 2023-06-25
Data Obfuscation
Malware Classification
Information Hiding Techniques

Towards Automated Classification of Attackers’ TTPs by combining NLP with ML Techniques

Authors: Clemens Sauerwein, Alexander Pfohl | Published: 2022-07-18
Text Extraction Method
Training Data Generation
Information Hiding Techniques

Imitation Privacy

Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30
Data Generation
Information Hiding Techniques
Adversarial attack

Forgetting Outside the Box: Scrubbing Deep Networks of Information Accessible from Input-Output Observations

Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2020-03-05 | Updated: 2020-10-29
Machine learning
Information Hiding Techniques
Deep Learning Method

CycleGAN, a Master of Steganography

Authors: Casey Chu, Andrey Zhmoginov, Mark Sandler | Published: 2017-12-08 | Updated: 2017-12-16
Certified Robustness
Information Hiding Techniques
Generative Adversarial Network