Watermark Evaluation

Data-Free Hard-Label Robustness Stealing Attack

Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12
Watermarking
Robustness Evaluation
Watermark Evaluation

Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More

Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15
Robustness Evaluation
Watermark Robustness
Watermark Evaluation

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31
Query Generation Method
Prompt Injection
Watermark Evaluation

FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning

Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02
Watermarking
Fraudulent Transaction
Watermark Evaluation

Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting

Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05
Watermarking
Machine Unlearning
Watermark Evaluation

Mark My Words: Analyzing and Evaluating Language Model Watermarks

Authors: Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David Wagner | Published: 2023-12-01 | Updated: 2024-10-11
Prompt Injection
Watermark Robustness
Watermark Evaluation

Continuous Authentication Using Mouse Clickstream Data Analysis

Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23
Model Performance Evaluation
User Authentication System
Watermark Evaluation

Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples

Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20
Backdoor Attack
Adversarial Attack Methods
Watermark Evaluation

What can we learn from Data Leakage and Unlearning for Law?

Authors: Jaydeep Borkar | Published: 2023-07-19
Data Leakage
Measurement of Memorization
Watermark Evaluation

Eliminating Label Leakage in Tree-Based Vertical Federated Learning

Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22
Membership Inference
Label Inference Attack
Watermark Evaluation