Towards Code Watermarking with Dual-Channel Transformations Authors: Borui Yang, Wei Li, Liyao Xiang, Bo Li | Published: 2023-09-02 | Updated: 2024-01-02 Data Protection MethodFeature Selection MethodWatermark Robustness 2023.09.02 2025.05.28 Literature Database
On the Steganographic Capacity of Selected Learning Models Authors: Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp | Published: 2023-08-29 Data GenerationMachine Learning MethodWatermark Robustness 2023.08.29 2025.05.28 Literature Database
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching Authors: M. Caner Tol, Berk Sunar | Published: 2023-08-24 LLM SecurityVulnerability Mitigation TechniqueWatermark Robustness 2023.08.24 2025.05.28 Literature Database
DUAW: Data-free Universal Adversarial Watermark against Stable Diffusion Customization Authors: Xiaoyu Ye, Hao Huang, Jiaqi An, Yongtao Wang | Published: 2023-08-19 Customization MethodData GenerationWatermark Robustness 2023.08.19 2025.05.28 Literature Database
Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16 Security AssuranceAttack EvaluationWatermark Robustness 2023.08.16 2025.05.28 Literature Database
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification Authors: Hongwei Yao, Jian Lou, Kui Ren, Zhan Qin | Published: 2023-08-05 | Updated: 2023-11-28 Soft Prompt OptimizationPrompt InjectionWatermark Robustness 2023.08.05 2025.05.28 Literature Database
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud Authors: Pinglan Liu, Wensheng Zhang | Published: 2023-08-02 Multi-Party ComputationDeep Learning MethodWatermark Robustness 2023.08.02 2025.05.28 Literature Database
Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03 Adversarial ExampleAdversarial attackWatermark Robustness 2023.08.02 2025.05.28 Literature Database
Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi | Published: 2023-08-01 Watermarking Settings for Medical DataWatermark RobustnessFederated Learning 2023.08.01 2025.05.28 Literature Database
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30 CybersecurityAdversarial Spectrum Attack DetectionWatermark Robustness 2023.07.30 2025.05.28 Literature Database