Watermarking

SoK: Unintended Interactions among Machine Learning Defenses and Risks

Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan | Published: 2023-12-07 | Updated: 2024-04-04
Watermarking
Adversarial Example
Overfitting and Memorization

Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks

Authors: Xiaobei Yan, Chip Hong Chang, Tianwei Zhang | Published: 2023-12-07
Watermarking
Defense Method

Understanding (Un)Intended Memorization in Text-to-Image Generative Models

Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr | Published: 2023-12-06
Evolution of AI
Watermarking
Cybersecurity

When PETs misbehave: A Contextual Integrity analysis

Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05
Watermarking
Privacy Protection
Privacy Protection Method

Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems

Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz | Published: 2023-12-05
Watermarking
Data Generation
Intrusion Detection System

Hot PATE: Private Aggregation of Distributions for Diverse Task

Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17
Watermarking
Privacy Protection Method
Computational Efficiency

Breaking XOR Arbiter PUFs without Reliability Information

Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03
Evaluation Methods for PUF
Watermarking
Attack Method

FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning

Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02
Watermarking
Fraudulent Transaction
Watermark Evaluation

Malicious code detection in android: the role of sequence characteristics and disassembling methods

Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02
LSTM Model Performance Evaluation
Watermarking
Malware Classification

Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting

Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05
Watermarking
Machine Unlearning
Watermark Evaluation