Data-Free Hard-Label Robustness Stealing Attack Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12 WatermarkingRobustness EvaluationWatermark Evaluation 2023.12.10 2025.05.28 Literature Database
Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15 Robustness EvaluationWatermark RobustnessWatermark Evaluation 2023.12.05 2025.05.28 Literature Database
Tree of Attacks: Jailbreaking Black-Box LLMs Automatically Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31 Query Generation MethodPrompt InjectionWatermark Evaluation 2023.12.04 2025.05.28 Literature Database
FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02 WatermarkingFraudulent TransactionWatermark Evaluation 2023.12.02 2025.05.28 Literature Database
Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05 WatermarkingMachine UnlearningWatermark Evaluation 2023.12.01 2025.05.28 Literature Database
Mark My Words: Analyzing and Evaluating Language Model Watermarks Authors: Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David Wagner | Published: 2023-12-01 | Updated: 2024-10-11 Prompt InjectionWatermark RobustnessWatermark Evaluation 2023.12.01 2025.05.28 Literature Database
Continuous Authentication Using Mouse Clickstream Data Analysis Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23 Model Performance EvaluationUser Authentication SystemWatermark Evaluation 2023.11.23 2025.05.28 Literature Database
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20 Backdoor AttackAdversarial Attack MethodsWatermark Evaluation 2023.07.20 2025.05.28 Literature Database
What can we learn from Data Leakage and Unlearning for Law? Authors: Jaydeep Borkar | Published: 2023-07-19 Data LeakageMeasurement of MemorizationWatermark Evaluation 2023.07.19 2025.05.28 Literature Database
Eliminating Label Leakage in Tree-Based Vertical Federated Learning Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22 Membership InferenceLabel Inference AttackWatermark Evaluation 2023.07.19 2025.05.28 Literature Database