Watermark Evaluation

Continuous Authentication Using Mouse Clickstream Data Analysis

Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23
Model Performance Evaluation
User Authentication System
Watermark Evaluation

Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples

Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20
Backdoor Attack
Adversarial Attack Methods
Watermark Evaluation

What can we learn from Data Leakage and Unlearning for Law?

Authors: Jaydeep Borkar | Published: 2023-07-19
Data Leakage
Measurement of Memorization
Watermark Evaluation

Eliminating Label Leakage in Tree-Based Vertical Federated Learning

Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22
Membership Inference
Label Inference Attack
Watermark Evaluation

A Privacy-Preserving Federated Learning Approach for Kernel methods

Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05
MPC Algorithm
Privacy Enhancing Technology
Watermark Evaluation

PassGPT: Password Modeling and (Guided) Generation with Large Language Models

Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14
LLM Application
Model Design and Accuracy
Watermark Evaluation

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02
Attack Evaluation
Adversarial attack
Watermark Evaluation

FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking

Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02
Privacy Enhancing Technology
Intellectual Property Protection
Watermark Evaluation

DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection

Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23
Dataset Generation
Intellectual Property Protection
Watermark Evaluation

Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach

Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01
Adversarial Example
Adversarial attack
Watermark Evaluation