MiZero: The Shadowy Defender Against Text Style Infringements Authors: Ziwei Zhang, Juan Wen, Wanli Peng, Zhengxian Wu, Yinghan Zhou, Yiming Xue | Published: 2025-03-30 | Updated: 2025-05-29 Prompt InjectionIntellectual Property ProtectionWatermarking Technology 2025.03.30 2025.05.31 Literature Database
FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02 Privacy Enhancing TechnologyIntellectual Property ProtectionWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23 Dataset GenerationIntellectual Property ProtectionWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Understanding Programs by Exploiting (Fuzzing) Test Cases Authors: Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, Hao Chen | Published: 2023-05-23 | Updated: 2023-06-12 Code Change AnalysisProgram UnderstandingIntellectual Property Protection 2023.05.23 2025.05.28 Literature Database
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks Authors: Zhi Qin Tan, Hao Shan Wong, Chee Seng Chan | Published: 2022-10-03 | Updated: 2022-10-04 DNN IP Protection MethodPerformance Evaluation MetricsIntellectual Property Protection 2022.10.03 2025.05.28 Literature Database
Mobile authentication of copy detection patterns: how critical is to know fakes? Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 Data GenerationPerformance EvaluationIntellectual Property Protection 2021.10.05 2025.05.28 Literature Database
Dataset Inference: Ownership Resolution in Machine Learning Authors: Pratyush Maini, Mohammad Yaghini, Nicolas Papernot | Published: 2021-04-21 Data Privacy AssessmentIntellectual Property ProtectionStatistical Hypothesis Testing 2021.04.21 2025.05.28 Literature Database
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22 Attack MethodIntellectual Property ProtectionWatermark Removal Technology 2020.04.22 2025.05.28 Literature Database
Privacy-Preserving Machine Learning Using EtC Images Authors: Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-11-01 Privacy ManagementDimensionality Reduction MethodIntellectual Property Protection 2019.11.01 2025.05.28 Literature Database