Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11 WatermarkingSecurity AnalysisWatermark Evaluation 2024.01.11 2025.05.27 Literature Database
Improving the Privacy and Practicality of Objective Perturbation for Differentially Private Linear Learners Authors: Rachel Redberg, Antti Koskela, Yu-Xiang Wang | Published: 2023-12-31 Hyperparameter TuningPrivacy Protection MethodWatermark Evaluation 2023.12.31 2025.05.27 Literature Database
Can you See me? On the Visibility of NOPs against Android Malware Detectors Authors: Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger | Published: 2023-12-28 Code Change AnalysisAttack MethodWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Optimizing watermarks for large language models Authors: Bram Wouters | Published: 2023-12-28 Optimization MethodsWatermark RobustnessWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Attack Tree Analysis for Adversarial Evasion Attacks Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28 PoisoningAdversarial attackWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo | Published: 2023-12-28 PoisoningMachine UnlearningWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration Authors: Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard | Published: 2023-12-21 | Updated: 2024-06-10 WatermarkingPrivacy Protection MethodWatermark Evaluation 2023.12.21 2025.05.27 Literature Database
Rethinking Robustness of Model Attributions Authors: Sandesh Kamath, Sankalp Mittal, Amit Deshpande, Vineeth N Balasubramanian | Published: 2023-12-16 Robustness EvaluationWatermark RobustnessWatermark Evaluation 2023.12.16 2025.05.27 Literature Database
Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu | Published: 2023-12-15 | Updated: 2024-10-10 Privacy Protection MethodPrompt InjectionWatermark Evaluation 2023.12.15 2025.05.27 Literature Database
Unsupervised and Supervised learning by Dense Associative Memory under replica symmetry breaking Authors: Linda Albanese, Andrea Alessandrelli, Alessia Annibale, Adriano Barra | Published: 2023-12-15 Convergence PropertyWatermark RobustnessWatermark Evaluation 2023.12.15 2025.05.27 Literature Database