Machine Learning in Digital Forensics: A Systematic Literature Review Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08 WatermarkingData Extraction and AnalysisImage Forensics 2023.06.08 2025.05.28 Literature Database
Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13 WatermarkingEnergy ManagementAttack Evaluation 2023.06.08 2025.05.28 Literature Database
Hardness of Deceptive Certificate Selection Authors: Stephan Wäldchen | Published: 2023-06-07 WatermarkingFeature Selection MethodCertificate Ratio 2023.06.07 2025.05.28 Literature Database
Human-imperceptible, Machine-recognizable Images Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao | Published: 2023-06-06 WatermarkingPrivacy Enhancing TechnologyModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
Machine Unlearning: A Survey Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu | Published: 2023-06-06 WatermarkingMembership InferenceModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14 WatermarkingPrivacy AssessmentFeature Extraction Method 2023.05.01 2025.05.28 Literature Database
C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference Authors: Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel | Published: 2023-04-26 DNN IP Protection MethodWatermarkingPrivacy Assessment 2023.04.26 2025.05.28 Literature Database
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks Authors: Isabell Lederer, Rudolf Mayer, Andreas Rauber | Published: 2023-04-22 DNN IP Protection MethodWatermarkingMembership Inference 2023.04.22 2025.05.28 Literature Database
Understanding Overfitting in Adversarial Training via Kernel Regression Authors: Teng Zhang, Kang Li | Published: 2023-04-13 | Updated: 2023-04-19 WatermarkingRobustnessRegularization 2023.04.13 2025.05.28 Literature Database
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14 DNN IP Protection MethodWatermarkingBackdoor Attack 2023.04.12 2025.05.28 Literature Database