Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29 WatermarkingCryptographyCryptography 2023.11.29 2025.05.28 Literature Database
De-identification of clinical free text using natural language processing: A systematic review of current approaches Authors: Aleksandar Kovačević, Bojana Bašaragin, Nikola Milošević, Goran Nenadić | Published: 2023-11-28 WatermarkingData ObfuscationWatermarking Settings for Medical Data 2023.11.28 2025.05.28 Literature Database
Acoustic Cybersecurity: Exploiting Voice-Activated Systems Authors: Forrest McKee, David Noever | Published: 2023-11-23 WatermarkingCybersecuritySpeech Synthesis Technology 2023.11.23 2025.05.28 Literature Database
Embarrassingly Simple Text Watermarks Authors: Ryoma Sato, Yuki Takezawa, Han Bao, Kenta Niwa, Makoto Yamada | Published: 2023-10-13 WatermarkingSteganography TechniquesData Generation 2023.10.13 2025.05.28 Literature Database
A Semantic Invariant Robust Watermark for Large Language Models Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19 WatermarkingPrompt InjectionPerformance Evaluation 2023.10.10 2025.05.28 Literature Database
Adversarial Attacks on Combinatorial Multi-Armed Bandits Authors: Rishab Balasubramanian, Jiawei Li, Prasad Tadepalli, Huazheng Wang, Qingyun Wu, Haoyu Zhao | Published: 2023-10-08 | Updated: 2024-06-04 AlgorithmWatermarkingMachine Learning Method 2023.10.08 2025.05.28 Literature Database
Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset Authors: Tharindu Lakshan Yasarathna, Lojenaa Navanesan, Simon Barque, Assanka Sayakkara, Nhien-An Le-Khac | Published: 2023-10-04 WatermarkingCross-Device AnalysisClassification Pattern Analysis 2023.10.04 2025.05.28 Literature Database
Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption Authors: Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar | Published: 2023-10-04 | Updated: 2024-10-07 WatermarkingPrivacy ProtectionLoss Function 2023.10.04 2025.05.28 Literature Database
zkFL: Zero-Knowledge Proof-based Gradient Aggregation for Federated Learning Authors: Zhipeng Wang, Nanqing Dong, Jiahao Sun, William Knottenbelt, Yike Guo | Published: 2023-10-04 | Updated: 2024-05-10 WatermarkingPrivacy ProtectionFederated Learning 2023.10.04 2025.05.28 Literature Database
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02 WatermarkingSecurity AnalysisThreat modeling 2023.10.02 2025.05.28 Literature Database