Watermark Robustness

Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks

Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03
Adversarial Example
Adversarial attack
Watermark Robustness

Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation

Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi | Published: 2023-08-01
Watermarking Settings for Medical Data
Watermark Robustness
Federated Learning

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30
Cybersecurity
Adversarial Spectrum Attack Detection
Watermark Robustness

A LLM Assisted Exploitation of AI-Guardian

Authors: Nicholas Carlini | Published: 2023-07-20
Prompt Injection
Membership Inference
Watermark Robustness

MasterKey: Automated Jailbreak Across Multiple Large Language Model Chatbots

Authors: Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu | Published: 2023-07-16 | Updated: 2023-10-25
Data Leakage
Prompt Injection
Watermark Robustness

An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04
Algorithm Design
Computational Complexity
Watermark Robustness

When Vision Fails: Text Attacks Against ViT and OCR

Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12
Performance Evaluation
Attack Pattern Extraction
Watermark Robustness

Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation

Authors: Tzu-Yun Chien, Chih-Ya Shen | Published: 2022-08-10
Customization Method
Adversarial Example
Watermark Robustness

Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15
Algorithm
Experimental Validation
Watermark Robustness

Defending against adversarial attacks by randomized diversification

Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-04-01
Adversarial Example Detection
Adversarial Attack Detection
Watermark Robustness