Watermarking Technology

Defending against Indirect Prompt Injection by Instruction Detection

Authors: Tongyu Wen, Chenglong Wang, Xiyuan Yang, Haoyu Tang, Yueqi Xie, Lingjuan Lyu, Zhicheng Dou, Fangzhao Wu | Published: 2025-05-08 | Updated: 2025-09-17
Prompt validation
Evaluation Method
Watermarking Technology

Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks

Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08
Prompt leaking
Attack Method
Watermarking Technology

On the Price of Differential Privacy for Hierarchical Clustering

Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22
Graph Construction
Privacy protection framework
Watermarking Technology

GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security

Authors: Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu | Published: 2025-04-21
Adversarial Learning
Generative Model
Watermarking Technology

Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages

Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21
Smart Contract Audit
Vulnerability Research
Watermarking Technology

How Effective Can Dropout Be in Multiple Instance Learning ?

Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21 | Updated: 2025-05-20
Performance Evaluation
Multi-Class Classification
Watermarking Technology

BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models

Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21
Prompt Injection
Attack Detection
Watermarking Technology

MiZero: The Shadowy Defender Against Text Style Infringements

Authors: Ziwei Zhang, Juan Wen, Wanli Peng, Zhengxian Wu, Yinghan Zhou, Yiming Xue | Published: 2025-03-30 | Updated: 2025-05-29
Prompt Injection
Intellectual Property Protection
Watermarking Technology

Instance-Level Data-Use Auditing of Visual ML Models

Authors: Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter | Published: 2025-03-28 | Updated: 2025-09-16
データ毒性
Detection of Model Extraction Attacks
Watermarking Technology

Benchmarking Android Malware Detection: Traditional vs. Deep Learning Models

Authors: Guojun Liu, Doina Caragea, Xinming Ou, Sankardas Roy | Published: 2025-02-20 | Updated: 2025-07-30
データセットの影響
Review and Investigation
Watermarking Technology