Excuse me, sir? Your language model is leaking (information) Authors: Or Zamir | Published: 2024-01-18 WatermarkingPrompt InjectionDynamic Error Correction Code 2024.01.18 2025.05.27 Literature Database
MedBlindTuner: Towards Privacy-preserving Fine-tuning on Biomedical Images with Transformers and Fully Homomorphic Encryption Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-01-17 WatermarkingPrivacy ProtectionMedical Image Analysis 2024.01.17 2025.05.27 Literature Database
Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11 WatermarkingSecurity AnalysisWatermark Evaluation 2024.01.11 2025.05.27 Literature Database
When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization Authors: Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng | Published: 2024-01-11 WatermarkingMemory Management MethodModel Performance Evaluation 2024.01.11 2025.05.27 Literature Database
Evasive Hardware Trojan through Adversarial Power Trace Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani | Published: 2024-01-04 WatermarkingAdversarial attackWatermark Robustness 2024.01.04 2025.05.27 Literature Database
Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration Authors: D. Dhinakaran, S. M. Udhaya Sankar, D. Selvaraj, S. Edwin Raja | Published: 2024-01-01 WatermarkingPrivacy Protection MethodFederated Learning 2024.01.01 2025.05.27 Literature Database
AIJack: Let’s Hijack AI! Security and Privacy Risk Simulator for Machine Learning Authors: Hideaki Takahashi | Published: 2023-12-29 | Updated: 2024-04-08 WatermarkingPoisoningFederated Learning 2023.12.29 2025.05.27 Literature Database
Smuche: Scalar-Multiplicative Caching in Homomorphic Encryption Authors: Dongfang Zhao | Published: 2023-12-26 AlgorithmWatermarkingCryptography 2023.12.26 2025.05.27 Literature Database
SODA: Protecting Proprietary Information in On-Device Machine Learning Models Authors: Akanksha Atrey, Ritwik Sinha, Saayan Mitra, Prashant Shenoy | Published: 2023-12-22 WatermarkingPrivacy Protection MethodMembership Inference 2023.12.22 2025.05.27 Literature Database
Elevating Defenses: Bridging Adversarial Training and Watermarking for Model Resilience Authors: Janvi Thakkar, Giulio Zizzo, Sergio Maffeis | Published: 2023-12-21 | Updated: 2024-01-07 WatermarkingHyperparameter TuningAdversarial Training 2023.12.21 2025.05.27 Literature Database