C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference Authors: Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel | Published: 2023-04-26 DNN IP Protection MethodWatermarkingPrivacy Assessment 2023.04.26 2025.05.28 Literature Database
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks Authors: Isabell Lederer, Rudolf Mayer, Andreas Rauber | Published: 2023-04-22 DNN IP Protection MethodWatermarkingMembership Inference 2023.04.22 2025.05.28 Literature Database
Understanding Overfitting in Adversarial Training via Kernel Regression Authors: Teng Zhang, Kang Li | Published: 2023-04-13 | Updated: 2023-04-19 WatermarkingRobustnessRegularization 2023.04.13 2025.05.28 Literature Database
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14 DNN IP Protection MethodWatermarkingBackdoor Attack 2023.04.12 2025.05.28 Literature Database
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24 WatermarkingSecurity AnalysisPrivacy Technique 2023.04.12 2025.05.28 Literature Database
Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11 WatermarkingPrivacy AnalysisPrivacy Technique 2023.04.11 2025.05.28 Literature Database
AI Model Disgorgement: Methods and Choices Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07 DNN IP Protection MethodWatermarkingData Generation 2023.04.07 2025.05.28 Literature Database
When approximate design for fast homomorphic computation provides differential privacy guarantees Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06 WatermarkingPrivacy Enhancing TechnologyMachine Learning Method 2023.04.06 2025.05.28 Literature Database
Leveraging Deep Learning Approaches for Deepfake Detection: A Review Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04 WatermarkingModel SelectionMachine Learning Method 2023.04.04 2025.05.28 Literature Database
Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02 WatermarkingSoftware SecurityVulnerability Analysis 2023.02.24 2025.05.28 Literature Database