LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04 WatermarkingSecurity AnalysisAnomaly Detection Method 2024.04.03 2025.05.27 Literature Database
Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03 WatermarkingPhysical layer securityWatermark Evaluation 2024.04.03 2025.05.27 Literature Database
Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial Attack Authors: Ying Zhou, Ben He, Le Sun | Published: 2024-04-02 LLM SecurityWatermarkingAttack Method 2024.04.02 2025.05.27 Literature Database
AAA: an Adaptive Mechanism for Locally Differential Private Mean Estimation Authors: Fei Wei, Ergute Bao, Xiaokui Xiao, Yin Yang, Bolin Ding | Published: 2024-04-02 | Updated: 2024-04-03 WatermarkingPrivacy Protection MethodOptimization Problem 2024.04.02 2025.05.27 Literature Database
Deciphering the Interplay between Local Differential Privacy, Average Bayesian Privacy, and Maximum Bayesian Privacy Authors: Xiaojin Zhang, Yulin Fei, Wei Chen | Published: 2024-03-25 | Updated: 2024-04-02 WatermarkingPrivacy Protection MethodPrivacy Classification 2024.03.25 2025.05.27 Literature Database
Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training Authors: Shuai Zhao, Linchao Zhu, Ruijie Quan, Yi Yang | Published: 2024-03-23 | Updated: 2024-08-12 WatermarkingMembership InferenceWatermark Evaluation 2024.03.23 2025.05.27 Literature Database
Towards Better Statistical Understanding of Watermarking LLMs Authors: Zhongze Cai, Shang Liu, Hanzhao Wang, Huaiyang Zhong, Xiaocheng Li | Published: 2024-03-19 WatermarkingOptimization ProblemWatermark Robustness 2024.03.19 2025.05.27 Literature Database
Semantic Data Representation for Explainable Windows Malware Detection Models Authors: Peter Švec, Štefan Balogh, Martin Homola, Ján Kľuka, Tomáš Bisták | Published: 2024-03-18 WatermarkingDataset GenerationMalware Classification 2024.03.18 2025.05.27 Literature Database
QuantumLeak: Stealing Quantum Neural Networks from Cloud-based NISQ Machines Authors: Zhenxiao Fu, Min Yang, Cheng Chu, Yilun Xu, Gang Huang, Fan Chen | Published: 2024-03-16 WatermarkingModel Extraction AttackQuantum Framework 2024.03.16 2025.05.27 Literature Database
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15 WatermarkingBackdoor AttackPoisoning 2024.03.15 2025.05.27 Literature Database