Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration Authors: Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard | Published: 2023-12-21 | Updated: 2024-06-10 WatermarkingPrivacy Protection MethodWatermark Evaluation 2023.12.21 2025.05.27 Literature Database
Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP Authors: Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat | Published: 2023-12-20 SQL Injection Attack DetectionWatermarkingComputational Efficiency 2023.12.20 2025.05.27 Literature Database
EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection Authors: Xin Mu, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, Yue Yu | Published: 2023-12-19 WatermarkingModel Performance EvaluationWatermark Robustness 2023.12.19 2025.05.27 Literature Database
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication Authors: Hyunmin Choi, Simon Woo, Hyoungshick Kim | Published: 2023-12-18 | Updated: 2024-04-01 WatermarkingFingerprinting MethodPrivacy Protection 2023.12.18 2025.05.27 Literature Database
Android Malware Detection with Unbiased Confidence Guarantees Authors: Harris Papadopoulos, Nestoras Georgiou, Charalambos Eliades, Andreas Konstantinidis | Published: 2023-12-17 AlgorithmWatermarkingClass Imbalance 2023.12.17 2025.05.27 Literature Database
SAME: Sample Reconstruction against Model Extraction Attacks Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08 WatermarkingModel Performance EvaluationModel Extraction Attack 2023.12.17 2025.05.27 Literature Database
What to Remember: Self-Adaptive Continual Learning for Audio Deepfake Detection Authors: Xiaohui Zhang, Jiangyan Yi, Chenglong Wang, Chuyuan Zhang, Siding Zeng, Jianhua Tao | Published: 2023-12-15 WatermarkingDeep Fake Audio EvaluationSpeech Synthesis Technology 2023.12.15 2025.05.27 Literature Database
No-Skim: Towards Efficiency Robustness Evaluation on Skimming-based Language Models Authors: Shengyao Zhang, Mi Zhang, Xudong Pan, Min Yang | Published: 2023-12-15 | Updated: 2023-12-18 Evolution of AILLM SecurityWatermarking 2023.12.15 2025.05.27 Literature Database
Data-Free Hard-Label Robustness Stealing Attack Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12 WatermarkingRobustness EvaluationWatermark Evaluation 2023.12.10 2025.05.28 Literature Database
Beyond Gradient and Priors in Privacy Attacks: Leveraging Pooler Layer Inputs of Language Models in Federated Learning Authors: Jianwei Li, Sheng Liu, Qi Lei | Published: 2023-12-10 | Updated: 2024-03-15 WatermarkingPrivacy Protection MethodFederated Learning 2023.12.10 2025.05.28 Literature Database