PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06 DNN IP Protection MethodWatermarkingVulnerability detection 2023.02.22 2025.05.28 Literature Database
Generalization Bounds for Adversarial Contrastive Learning Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21 WatermarkingModel Performance EvaluationAdversarial Example 2023.02.21 2025.05.28 Literature Database
Certified private data release for sparse Lipschitz functions Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28 WatermarkingPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.19 2025.05.28 Literature Database
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation Authors: Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, Nam Sung Kim, Josep Torrellas | Published: 2023-02-03 | Updated: 2023-10-14 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.03 2025.05.28 Literature Database
Deep Learning model integrity checking mechanism using watermarking technique Authors: Shahinul Hoque, Farhin Farhad Riya, Yingyuan Yang, Jinyuan Sun | Published: 2023-01-29 | Updated: 2025-03-21 DNN IP Protection MethodWatermarkingModel Architecture 2023.01.29 2025.05.28 Literature Database
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering Authors: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang | Published: 2023-01-29 | Updated: 2024-03-02 WatermarkingPoisoningAnalysis of Detection Methods 2023.01.29 2025.05.28 Literature Database
Alignment with human representations supports robust few-shot learning Authors: Ilia Sucholutsky, Thomas L. Griffiths | Published: 2023-01-27 | Updated: 2023-10-29 Few-Shot LearningWatermarkingSafety Alignment 2023.01.27 2025.05.28 Literature Database
Practical Differentially Private Hyperparameter Tuning with Subsampling Authors: Antti Koskela, Tejas Kulkarni | Published: 2023-01-27 | Updated: 2024-02-13 WatermarkingPrivacy Enhancing TechnologyOptimization Problem 2023.01.27 2025.05.28 Literature Database
A Watermark for Large Language Models Authors: John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, Tom Goldstein | Published: 2023-01-24 | Updated: 2024-05-01 WatermarkingPrompt InjectionAnalysis of Detection Methods 2023.01.24 2025.05.28 Literature Database
DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2023-01-23 DNN IP Protection MethodWatermarkingAnalysis of Detection Methods 2023.01.23 2025.05.28 Literature Database