Zero-Knowledge Proof-based Practical Federated Learning on Blockchain Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24 WatermarkingSecurity AnalysisPrivacy Technique 2023.04.12 2025.05.28 Literature Database
Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11 WatermarkingPrivacy AnalysisPrivacy Technique 2023.04.11 2025.05.28 Literature Database
AI Model Disgorgement: Methods and Choices Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07 DNN IP Protection MethodWatermarkingData Generation 2023.04.07 2025.05.28 Literature Database
When approximate design for fast homomorphic computation provides differential privacy guarantees Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06 WatermarkingPrivacy Enhancing TechnologyMachine Learning Method 2023.04.06 2025.05.28 Literature Database
Leveraging Deep Learning Approaches for Deepfake Detection: A Review Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04 WatermarkingModel SelectionMachine Learning Method 2023.04.04 2025.05.28 Literature Database
Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02 WatermarkingSoftware SecurityVulnerability Analysis 2023.02.24 2025.05.28 Literature Database
On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space Authors: Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu | Published: 2023-02-23 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.23 2025.05.28 Literature Database
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06 DNN IP Protection MethodWatermarkingVulnerability detection 2023.02.22 2025.05.28 Literature Database
Generalization Bounds for Adversarial Contrastive Learning Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21 WatermarkingModel Performance EvaluationAdversarial Example 2023.02.21 2025.05.28 Literature Database
Certified private data release for sparse Lipschitz functions Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28 WatermarkingPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.19 2025.05.28 Literature Database