Watermarking

Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection

Authors: Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva | Published: 2022-04-27
Watermarking
Phishing Attack
Visual Similarity Detection

SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges

Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02
Watermarking
Privacy Protection
Privacy Protection in Machine Learning

SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders

Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31
Watermarking
Membership Inference
Defense Method

Guarding Machine Learning Hardware Against Physical Side-Channel Attacks

Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01
Watermarking
Computational Efficiency
Defense Mechanism

Wavelet Selection and Employment for Side-Channel Disassembly

Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25
Watermarking
Time-Frequency Analysis
evaluation metrics

Teacher Model Fingerprinting Attacks Against Transfer Learning

Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23
Watermarking
Data Collection
Prompt Injection

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20
Watermarking
Data Origins and Evolution
Poisoning

Simple Transparent Adversarial Examples

Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20
Watermarking
Adversarial attack
Vulnerability Attack Method

Balboa: Bobbing and Weaving around Network Censorship

Authors: Marc B. Rosen, James Parker, Alex J. Malozemoff | Published: 2021-04-13
Watermarking
Communication Analysis
Speech Synthesis Technology

MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection

Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05
Watermarking
Multi-Class Classification
Deep Learning Technology