Watermark

Generating Privacy-Preserving Personalized Advice with Zero-Knowledge Proofs and LLMs

Authors: Hiroki Watanabe, Motonobu Uchikoshi | Published: 2025-02-10 | Updated: 2025-04-24
Alignment
Privacy-Preserving Data Mining
Watermark

PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks

Authors: Xin Yang, Omid Ardakanian | Published: 2024-12-19 | Updated: 2025-08-05
Model Inversion
Differential Privacy
Watermark

Adversarial Reprogramming of Neural Networks

Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29
Certified Robustness
Adversarial Example
Watermark

On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10
Certified Robustness
Adversarial attack
Watermark

Robust Decentralized Learning Using ADMM with Unreliable Agents

Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21
Robustness Improvement Method
Convergence Property
Watermark

CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions

Authors: Jungwoo Lee, Dongjin Choi, Lee Sael | Published: 2017-10-09
Convergence Property
Interpretation Method
Watermark

Computation on Encrypted Data using Data Flow Authentication

Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01
Information Security
Information Flow Control
Watermark