Intellectual Property Protection

MiZero: The Shadowy Defender Against Text Style Infringements

Authors: Ziwei Zhang, Juan Wen, Wanli Peng, Zhengxian Wu, Yinghan Zhou, Yiming Xue | Published: 2025-03-30 | Updated: 2025-05-29
Prompt Injection
Intellectual Property Protection
Watermarking Technology

FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking

Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02
Privacy Enhancing Technology
Intellectual Property Protection
Watermark Evaluation

DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection

Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23
Dataset Generation
Intellectual Property Protection
Watermark Evaluation

Understanding Programs by Exploiting (Fuzzing) Test Cases

Authors: Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, Hao Chen | Published: 2023-05-23 | Updated: 2023-06-12
Code Change Analysis
Program Understanding
Intellectual Property Protection

An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks

Authors: Zhi Qin Tan, Hao Shan Wong, Chee Seng Chan | Published: 2022-10-03 | Updated: 2022-10-04
DNN IP Protection Method
Performance Evaluation Metrics
Intellectual Property Protection

Mobile authentication of copy detection patterns: how critical is to know fakes?

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05
Data Generation
Performance Evaluation
Intellectual Property Protection

Dataset Inference: Ownership Resolution in Machine Learning

Authors: Pratyush Maini, Mohammad Yaghini, Nicolas Papernot | Published: 2021-04-21
Data Privacy Assessment
Intellectual Property Protection
Statistical Hypothesis Testing

Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks

Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22
Attack Method
Intellectual Property Protection
Watermark Removal Technology

Privacy-Preserving Machine Learning Using EtC Images

Authors: Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-11-01
Privacy Management
Dimensionality Reduction Method
Intellectual Property Protection