Watermarking

Multi-Designated Detector Watermarking for Language Models

Authors: Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, Yue Yu | Published: 2024-09-26 | Updated: 2024-10-01
LLM Security
Watermarking
Watermark Evaluation

Exploring User-level Gradient Inversion with a Diffusion Prior

Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang | Published: 2024-09-11
Watermarking
Privacy Protection
Privacy Protection Method

On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective

Authors: Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller | Published: 2024-09-10
Watermarking
Attack Method
Watermark Robustness

Training quantum machine learning models on cloud without uploading the data

Authors: Guang Ping He | Published: 2024-09-06 | Updated: 2024-10-07
Algorithm
Watermarking
Quantum Framework

Comment on Revisiting Neural Program Smoothing for Fuzzing

Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06
Watermarking
Program Analysis
Evaluation Method

Poster: Developing an O-RAN Security Test Lab

Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02
Watermarking
Cybersecurity
Security Analysis

Defending against Model Inversion Attacks via Random Erasing

Authors: Viet-Hung Tran, Ngoc-Bao Nguyen, Son T. Mai, Hans Vandierendonck, Ngai-man Cheung | Published: 2024-09-02
Watermarking
Privacy Protection Method
Defense Method

Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection

Authors: Sachin Shukla, Omid Mirzaei | Published: 2024-08-29 | Updated: 2024-09-04
Watermarking
Spam Detection
Visual Similarity Detection

Mitigating Noise Detriment in Differentially Private Federated Learning with Model Pre-training

Authors: Huitong Jin, Yipeng Zhou, Laizhong Cui, Quan Z. Sheng | Published: 2024-08-18
Watermarking
Privacy Protection Method
Model Performance Evaluation

Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning

Authors: Joon Kim, Sejin Park | Published: 2024-08-15
Watermarking
Poisoning
Defense Method