Watermark Design

Bilateral Differentially Private Vertical Federated Boosted Decision Trees

Authors: Bokang Zhang, Zhikun Zhang, Haodong Jiang, Yang Liu, Lihao Zheng, Yuxiao Zhou, Shuaiting Huang, Junfeng Wu | Published: 2025-04-30
Privacy Risk Management
Differential Privacy
Watermark Design

Watermarking Needs Input Repetition Masking

Authors: David Khachaturov, Robert Mullins, Ilia Shumailov, Sumanth Dathathri | Published: 2025-04-16
LLM Performance Evaluation
Prompt validation
Watermark Design

zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing

Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16
Privacy Enhancing Protocol
Performance Evaluation Method
Watermark Design

Support is All You Need for Certified VAE Training

Authors: Changming Xu, Debangshu Banerjee, Deepak Vasisht, Gagandeep Singh | Published: 2025-04-16
Improvement of Learning
Adversarial attack
Watermark Design

Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs

Authors: Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen | Published: 2025-04-08
Efficient Proof System
Secure Arithmetic Computation
Watermark Design

Detecting LLM-Generated Peer Reviews

Authors: Vishisht Rao, Aounon Kumar, Himabindu Lakkaraju, Nihar B. Shah | Published: 2025-03-20 | Updated: 2025-05-19
Prompt Injection
Digital Watermarking for Generative AI
Watermark Design

How Well Can Differential Privacy Be Audited in One Run?

Authors: Amit Keinan, Moshe Shenfeld, Katrina Ligett | Published: 2025-03-10 | Updated: 2025-05-26
Privacy Issues
監査手法
Watermark Design

SoK: Decentralized AI (DeAI)

Authors: Zhipeng Wang, Rui Sun, Elizabeth Lui, Vatsal Shah, Xihan Xiong, Jiahao Sun, Davide Crapis, William Knottenbelt | Published: 2024-11-26 | Updated: 2025-04-16
Blockchain Integration
Distributed Learning
Watermark Design

Large Language Models as Carriers of Hidden Messages

Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05
Algorithm
Fingerprinting Method
Watermark Design

Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference

Authors: Ruying Bao, Sihang Liang, Qingcan Wang | Published: 2018-05-21 | Updated: 2018-09-29
Certified Robustness
Adversarial Attack Detection
Watermark Design