Watermark Evaluation

Differentially Private AUC Computation in Vertical Federated Learning

Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang | Published: 2022-05-24
Client-Side Component
Data Collection
Watermark Evaluation

Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency

Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09
Model Performance Evaluation
Deep Learning Method
Watermark Evaluation

Privacy-preserving feature selection: A survey and proposing a new set of protocols

Authors: Javad Rahimipour Anaraki, Saeed Samet | Published: 2020-08-17
Privacy-Preserving Data Mining
Evaluation Method
Watermark Evaluation

ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense

Authors: Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi | Published: 2020-01-02 | Updated: 2020-10-16
Adversarial Learning
Watermark Evaluation
Effectiveness Analysis of Defense Methods

secml: A Python Library for Secure and Explainable Machine Learning

Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio | Published: 2019-12-20 | Updated: 2022-05-13
Poisoning
Adversarial Learning
Watermark Evaluation

Random CapsNet Forest Model for Imbalanced Malware Type Classification Task

Authors: Aykut Çayır, Uğur Ünal, Hasan Dağ | Published: 2019-12-20 | Updated: 2020-08-23
Adversarial Learning
Deep Learning
Watermark Evaluation

A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction

Authors: Syed Rahman, Haneen Aburub, Yemeserach Mekonnen, Arif I. Sarwat | Published: 2018-06-07
Cybersecurity
Climate Information
Watermark Evaluation

MEBN-RM: A Mapping between Multi-Entity Bayesian Network and Relational Model

Authors: Cheol Young Park, Kathryn Blackmond Laskey | Published: 2018-06-06 | Updated: 2018-06-08
Relational Database
Watermark Evaluation
Function Mapping

Killing four birds with one Gaussian process: the relation between different test-time attacks

Authors: Kathrin Grosse, Michael T. Smith, Michael Backes | Published: 2018-06-06 | Updated: 2020-11-29
Prompt leaking
Membership Inference
Watermark Evaluation

Set-based Obfuscation for Strong PUFs against Machine Learning Attacks

Authors: Jiliang Zhang, Chaoqun Shen | Published: 2018-06-06 | Updated: 2019-11-13
Cybersecurity
User Authentication System
Watermark Evaluation