Watermarking

When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization

Authors: Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng | Published: 2024-01-11
Watermarking
Memory Management Method
Model Performance Evaluation

Evasive Hardware Trojan through Adversarial Power Trace

Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani | Published: 2024-01-04
Watermarking
Adversarial attack
Watermark Robustness

Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration

Authors: D. Dhinakaran, S. M. Udhaya Sankar, D. Selvaraj, S. Edwin Raja | Published: 2024-01-01
Watermarking
Privacy Protection Method
Federated Learning

AIJack: Let’s Hijack AI! Security and Privacy Risk Simulator for Machine Learning

Authors: Hideaki Takahashi | Published: 2023-12-29 | Updated: 2024-04-08
Watermarking
Poisoning
Federated Learning

Smuche: Scalar-Multiplicative Caching in Homomorphic Encryption

Authors: Dongfang Zhao | Published: 2023-12-26
Algorithm
Watermarking
Cryptography

SODA: Protecting Proprietary Information in On-Device Machine Learning Models

Authors: Akanksha Atrey, Ritwik Sinha, Saayan Mitra, Prashant Shenoy | Published: 2023-12-22
Watermarking
Privacy Protection Method
Membership Inference

Elevating Defenses: Bridging Adversarial Training and Watermarking for Model Resilience

Authors: Janvi Thakkar, Giulio Zizzo, Sergio Maffeis | Published: 2023-12-21 | Updated: 2024-01-07
Watermarking
Hyperparameter Tuning
Adversarial Training

Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration

Authors: Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard | Published: 2023-12-21 | Updated: 2024-06-10
Watermarking
Privacy Protection Method
Watermark Evaluation

Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP

Authors: Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat | Published: 2023-12-20
SQL Injection Attack Detection
Watermarking
Computational Efficiency

EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection

Authors: Xin Mu, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, Yue Yu | Published: 2023-12-19
Watermarking
Model Performance Evaluation
Watermark Robustness