Watermarking

Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25
TEE Implementation
Watermarking
Factors of Performance Degradation

Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning

Authors: Guneet S. Dhillon, Nicholas Carlini | Published: 2020-09-30
Watermarking
Robustness Improvement Method
Attack Evaluation

A Systematic Review on Model Watermarking for Neural Networks

Authors: Franziska Boenisch | Published: 2020-09-25 | Updated: 2021-12-08
Watermarking
Membership Inference
Model Identification

Optimal Provable Robustness of Quantum Classification via Quantum Hypothesis Testing

Authors: Maurice Weber, Nana Liu, Bo Li, Ce Zhang, Zhikuan Zhao | Published: 2020-09-21 | Updated: 2021-05-26
Watermarking
Robustness
Quantum Machine Learning

Feature Distillation With Guided Adversarial Contrastive Learning

Authors: Tao Bai, Jinnan Chen, Jun Zhao, Bihan Wen, Xudong Jiang, Alex Kot | Published: 2020-09-21
Watermarking
Adversarial Example
Adversarial Training

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models

Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17
Watermarking
Data Generation
Membership Inference

WAFFLE: Watermarking in Federated Learning

Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22
Watermarking
Poisoning
Machine Learning Application

Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry

Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13
Watermarking
Code Change Analysis
Security Analysis

Deep-Lock: Secure Authorization for Deep Neural Networks

Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18
Watermarking
Security Analysis
Machine Learning Method

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11
Watermarking
Data Extraction and Analysis
Information Security