A Feature Set of Small Size for the PDF Malware Detection Authors: Ran Liu, Charles Nicholas | Published: 2023-08-09 | Updated: 2023-08-10 WatermarkingModel Performance EvaluationFeature Selection Method 2023.08.09 2025.05.28 Literature Database
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning Authors: Simon Queyrut, Yérom-David Bromberg, Valerio Schiavoni | Published: 2023-08-08 WatermarkingAdversarial Attack MethodsDefense Method 2023.08.08 2025.05.28 Literature Database
Breaking Speaker Recognition with PaddingBack Authors: Zhe Ye, Diqun Yan, Li Dong, Kailai Shen | Published: 2023-08-08 | Updated: 2024-03-11 WatermarkingBackdoor AttackPoisoning 2023.08.08 2025.05.28 Literature Database
Labeling without Seeing? Blind Annotation for Privacy-Preserving Entity Resolution Authors: Yixiang Yao, Weizhao Jin, Srivatsan Ravi | Published: 2023-08-07 WatermarkingData Protection MethodCryptography 2023.08.07 2025.05.28 Literature Database
When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection Authors: Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux | Published: 2023-08-07 WatermarkingData Protection MethodPoisoning 2023.08.07 2025.05.28 Literature Database
Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing Authors: Wai Man Si, Michael Backes, Yang Zhang | Published: 2023-08-07 WatermarkingPrompt InjectionChallenges of Generative Models 2023.08.07 2025.05.28 Literature Database
PURL: Safe and Effective Sanitization of Link Decoration Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby | Published: 2023-08-07 | Updated: 2024-03-06 WatermarkingData Protection MethodData Collection 2023.08.07 2025.05.28 Literature Database
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu | Published: 2023-08-07 | Updated: 2024-05-06 WatermarkingVulnerability detectionStatic Analysis 2023.08.07 2025.05.28 Literature Database
Global Differential Privacy for Distributed Metaverse Healthcare Systems Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20 WatermarkingData Protection MethodMachine Learning Method 2023.07.22 2025.05.28 Literature Database
DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09 WatermarkingCyber AttackDigital Twin 2023.06.09 2025.05.28 Literature Database