A Privacy-Preserving Federated Learning Approach for Kernel methods Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05 MPC AlgorithmPrivacy Enhancing TechnologyWatermark Evaluation 2023.06.05 2025.05.28 Literature Database
PassGPT: Password Modeling and (Guided) Generation with Large Language Models Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14 LLM ApplicationModel Design and AccuracyWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02 Attack EvaluationAdversarial attackWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02 Privacy Enhancing TechnologyIntellectual Property ProtectionWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23 Dataset GenerationIntellectual Property ProtectionWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01 Adversarial ExampleAdversarial attackWatermark Evaluation 2023.06.01 2025.05.28 Literature Database
A Note On Interpreting Canary Exposure Authors: Matthew Jagielski | Published: 2023-05-31 | Updated: 2023-06-02 Privacy Protection MethodMembership InferenceWatermark Evaluation 2023.05.31 2025.05.28 Literature Database
Differential Privacy with Random Projections and Sign Random Projections Authors: Ping Li, Xiaoyun Li | Published: 2023-05-22 | Updated: 2023-06-13 Data Privacy AssessmentPrivacy Enhancing TechnologyWatermark Evaluation 2023.05.22 2025.05.28 Literature Database
Perfectly Secure Steganography Using Minimum Entropy Coupling Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30 Privacy TechniqueWatermark EvaluationCommunication Model 2022.10.24 2025.05.28 Literature Database
Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence Authors: Carles Domingo-Enrich, Youssef Mroueh | Published: 2022-05-27 Privacy AssessmentFrameworkWatermark Evaluation 2022.05.27 2025.05.28 Literature Database