Towards Certification of Uncertainty Calibration under Adversarial Attacks Authors: Cornelius Emde, Francesco Pinto, Thomas Lukasiewicz, Philip H. S. Torr, Adel Bibi | Published: 2024-05-22 Evaluation MethodWatermark EvaluationDifficulty Calibration 2024.05.22 2025.05.27 Literature Database
Naturally Private Recommendations with Determinantal Point Processes Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22 WatermarkingPrivacy Protection MethodWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22 WatermarkingWatermark RobustnessWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen | Published: 2024-05-18 Model Performance EvaluationEvaluation MethodWatermark Evaluation 2024.05.18 2025.05.27 Literature Database
Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography Authors: Minhao Bai. Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang | Published: 2024-05-15 LLM Performance EvaluationDomain IndependenceWatermark Evaluation 2024.05.15 2025.05.27 Literature Database
Model Reconstruction Using Counterfactual Explanations: A Perspective From Polytope Theory Authors: Pasan Dissanayake, Sanghamitra Dutta | Published: 2024-05-08 | Updated: 2024-11-05 Model Performance EvaluationModel Extraction AttackWatermark Evaluation 2024.05.08 2025.05.27 Literature Database
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack Authors: Kaiyi Pang, Tao Qi, Chuhan Wu, Minhao Bai, Minghu Jiang, Yongfeng Huang | Published: 2024-05-03 | Updated: 2025-01-12 WatermarkingPrompt InjectionWatermark Evaluation 2024.05.03 2025.05.27 Literature Database
Why You Should Not Trust Interpretations in Machine Learning: Adversarial Attacks on Partial Dependence Plots Authors: Xi Xin, Giles Hooker, Fei Huang | Published: 2024-04-29 | Updated: 2024-05-01 Model InterpretabilityAdversarial TrainingWatermark Evaluation 2024.04.29 2025.05.27 Literature Database
Attacking Bayes: On the Adversarial Robustness of Bayesian Neural Networks Authors: Yunzhen Feng, Tim G. J. Rudner, Nikolaos Tsilivis, Julia Kempe | Published: 2024-04-27 Quantification of UncertaintyAdversarial ExampleWatermark Evaluation 2024.04.27 2025.05.27 Literature Database
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape Authors: Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath | Published: 2024-04-24 PoisoningWatermark EvaluationDefense Method 2024.04.24 2025.05.27 Literature Database