Watermark Evaluation

A Privacy-Preserving Federated Learning Approach for Kernel methods

Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05
MPC Algorithm
Privacy Enhancing Technology
Watermark Evaluation

PassGPT: Password Modeling and (Guided) Generation with Large Language Models

Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14
LLM Application
Model Design and Accuracy
Watermark Evaluation

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02
Attack Evaluation
Adversarial attack
Watermark Evaluation

FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking

Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02
Privacy Enhancing Technology
Intellectual Property Protection
Watermark Evaluation

DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection

Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23
Dataset Generation
Intellectual Property Protection
Watermark Evaluation

Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach

Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01
Adversarial Example
Adversarial attack
Watermark Evaluation

A Note On Interpreting Canary Exposure

Authors: Matthew Jagielski | Published: 2023-05-31 | Updated: 2023-06-02
Privacy Protection Method
Membership Inference
Watermark Evaluation

Differential Privacy with Random Projections and Sign Random Projections

Authors: Ping Li, Xiaoyun Li | Published: 2023-05-22 | Updated: 2023-06-13
Data Privacy Assessment
Privacy Enhancing Technology
Watermark Evaluation

Perfectly Secure Steganography Using Minimum Entropy Coupling

Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30
Privacy Technique
Watermark Evaluation
Communication Model

Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence

Authors: Carles Domingo-Enrich, Youssef Mroueh | Published: 2022-05-27
Privacy Assessment
Framework
Watermark Evaluation