Watermarking

GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis

Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu | Published: 2023-08-07 | Updated: 2024-05-06
Watermarking
Vulnerability detection
Static Analysis

Global Differential Privacy for Distributed Metaverse Healthcare Systems

Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20
Watermarking
Data Protection Method
Machine Learning Method

DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales

Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09
Watermarking
Cyber Attack
Digital Twin

Machine Learning in Digital Forensics: A Systematic Literature Review

Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08
Watermarking
Data Extraction and Analysis
Image Forensics

Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks

Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13
Watermarking
Energy Management
Attack Evaluation

Hardness of Deceptive Certificate Selection

Authors: Stephan Wäldchen | Published: 2023-06-07
Watermarking
Feature Selection Method
Certificate Ratio

Human-imperceptible, Machine-recognizable Images

Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao | Published: 2023-06-06
Watermarking
Privacy Enhancing Technology
Model Design and Accuracy

Machine Unlearning: A Survey

Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu | Published: 2023-06-06
Watermarking
Membership Inference
Model Design and Accuracy

GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference

Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14
Watermarking
Privacy Assessment
Feature Extraction Method

C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference

Authors: Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel | Published: 2023-04-26
DNN IP Protection Method
Watermarking
Privacy Assessment