Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding Authors: Jonggyu Jang, Hyeonsu Lyu, Seongjin Hwang, Hyun Jong Yang | Published: 2024-08-08 WatermarkingWatermark EvaluationFace Recognition System 2024.08.08 2025.05.27 Literature Database
Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20 Trust Evaluation ModuleEvaluation MethodWatermark Evaluation 2024.06.25 2025.05.27 Literature Database
Can Go AIs be adversarially robust? Authors: Tom Tseng, Euan McLean, Kellin Pelrine, Tony T. Wang, Adam Gleave | Published: 2024-06-18 | Updated: 2025-01-14 Model Performance EvaluationAttack MethodWatermark Evaluation 2024.06.18 2025.05.27 Literature Database
Auditing Differential Privacy Guarantees Using Density Estimation Authors: Antti Koskela, Jafar Mohammadi | Published: 2024-06-07 | Updated: 2024-10-11 Privacy Protection MethodEvaluation MethodWatermark Evaluation 2024.06.07 2025.05.27 Literature Database
Towards Certification of Uncertainty Calibration under Adversarial Attacks Authors: Cornelius Emde, Francesco Pinto, Thomas Lukasiewicz, Philip H. S. Torr, Adel Bibi | Published: 2024-05-22 Evaluation MethodWatermark EvaluationDifficulty Calibration 2024.05.22 2025.05.27 Literature Database
Naturally Private Recommendations with Determinantal Point Processes Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22 WatermarkingPrivacy Protection MethodWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22 WatermarkingWatermark RobustnessWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen | Published: 2024-05-18 Model Performance EvaluationEvaluation MethodWatermark Evaluation 2024.05.18 2025.05.27 Literature Database
Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography Authors: Minhao Bai. Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang | Published: 2024-05-15 LLM Performance EvaluationDomain IndependenceWatermark Evaluation 2024.05.15 2025.05.27 Literature Database
Model Reconstruction Using Counterfactual Explanations: A Perspective From Polytope Theory Authors: Pasan Dissanayake, Sanghamitra Dutta | Published: 2024-05-08 | Updated: 2024-11-05 Model Performance EvaluationModel Extraction AttackWatermark Evaluation 2024.05.08 2025.05.27 Literature Database