Multi-Designated Detector Watermarking for Language Models Authors: Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, Yue Yu | Published: 2024-09-26 | Updated: 2024-10-01 LLM SecurityWatermarkingWatermark Evaluation 2024.09.26 2025.05.27 Literature Database
Exploring User-level Gradient Inversion with a Diffusion Prior Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang | Published: 2024-09-11 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.09.11 2025.05.27 Literature Database
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective Authors: Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller | Published: 2024-09-10 WatermarkingAttack MethodWatermark Robustness 2024.09.10 2025.05.27 Literature Database
Training quantum machine learning models on cloud without uploading the data Authors: Guang Ping He | Published: 2024-09-06 | Updated: 2024-10-07 AlgorithmWatermarkingQuantum Framework 2024.09.06 2025.05.27 Literature Database
Comment on Revisiting Neural Program Smoothing for Fuzzing Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06 WatermarkingProgram AnalysisEvaluation Method 2024.09.06 2025.05.27 Literature Database
Poster: Developing an O-RAN Security Test Lab Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02 WatermarkingCybersecuritySecurity Analysis 2024.09.02 2025.05.27 Literature Database
Defending against Model Inversion Attacks via Random Erasing Authors: Viet-Hung Tran, Ngoc-Bao Nguyen, Son T. Mai, Hans Vandierendonck, Ngai-man Cheung | Published: 2024-09-02 WatermarkingPrivacy Protection MethodDefense Method 2024.09.02 2025.05.27 Literature Database
Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection Authors: Sachin Shukla, Omid Mirzaei | Published: 2024-08-29 | Updated: 2024-09-04 WatermarkingSpam DetectionVisual Similarity Detection 2024.08.29 2025.05.27 Literature Database
Mitigating Noise Detriment in Differentially Private Federated Learning with Model Pre-training Authors: Huitong Jin, Yipeng Zhou, Laizhong Cui, Quan Z. Sheng | Published: 2024-08-18 WatermarkingPrivacy Protection MethodModel Performance Evaluation 2024.08.18 2025.05.27 Literature Database
Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning Authors: Joon Kim, Sejin Park | Published: 2024-08-15 WatermarkingPoisoningDefense Method 2024.08.15 2025.05.27 Literature Database