Watermarking Technology

How Effective Can Dropout Be in Multiple Instance Learning ?

Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21 | Updated: 2025-05-20
Performance Evaluation
Multi-Class Classification
Watermarking Technology

BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models

Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21
Prompt Injection
Attack Detection
Watermarking Technology

MiZero: The Shadowy Defender Against Text Style Infringements

Authors: Ziwei Zhang, Juan Wen, Wanli Peng, Zhengxian Wu, Yinghan Zhou, Yiming Xue | Published: 2025-03-30 | Updated: 2025-05-29
Prompt Injection
Intellectual Property Protection
Watermarking Technology

A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning

Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27
Privacy Issues
Watermarking Technology
Federated Learning

ExpShield: Safeguarding Web Text from Unauthorized Crawling and Language Modeling Exploitation

Authors: Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong | Published: 2024-12-30 | Updated: 2025-05-07
Text Perturbation Method
Backdoor Detection
Watermarking Technology

CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models

Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21
Cyber Threat Intelligence
Prompt leaking
Watermarking Technology

“Yes, My LoRD.” Guiding Language Model Extraction with Locality Reinforced Distillation

Authors: Zi Liang, Qingqing Ye, Yanyun Wang, Sen Zhang, Yaxin Xiao, Ronghua Li, Jianliang Xu, Haibo Hu | Published: 2024-09-04 | Updated: 2025-05-19
LLM Security
Model Extraction Attack
Watermarking Technology

Undetectable Watermarks for Language Models

Authors: Miranda Christ, Sam Gunn, Or Zamir | Published: 2023-05-25
Prompt leaking
Digital Watermarking for Generative AI
Watermarking Technology

Graph Backdoor

Authors: Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang | Published: 2020-06-21 | Updated: 2021-08-10
Graph Neural Network
Attack Method
Watermarking Technology

Rotation-Equivariant Neural Networks for Privacy Protection

Authors: Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang | Published: 2020-06-21
Machine Learning Algorithm
Feature Extraction Method
Watermarking Technology