Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25 TEE ImplementationWatermarkingFactors of Performance Degradation 2020.10.25 2025.05.28 Literature Database
Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning Authors: Guneet S. Dhillon, Nicholas Carlini | Published: 2020-09-30 WatermarkingRobustness Improvement MethodAttack Evaluation 2020.09.30 2025.05.28 Literature Database
A Systematic Review on Model Watermarking for Neural Networks Authors: Franziska Boenisch | Published: 2020-09-25 | Updated: 2021-12-08 WatermarkingMembership InferenceModel Identification 2020.09.25 2025.05.28 Literature Database
Optimal Provable Robustness of Quantum Classification via Quantum Hypothesis Testing Authors: Maurice Weber, Nana Liu, Bo Li, Ce Zhang, Zhikuan Zhao | Published: 2020-09-21 | Updated: 2021-05-26 WatermarkingRobustnessQuantum Machine Learning 2020.09.21 2025.05.28 Literature Database
Feature Distillation With Guided Adversarial Contrastive Learning Authors: Tao Bai, Jinnan Chen, Jun Zhao, Bihan Wen, Xudong Jiang, Alex Kot | Published: 2020-09-21 WatermarkingAdversarial ExampleAdversarial Training 2020.09.21 2025.05.28 Literature Database
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17 WatermarkingData GenerationMembership Inference 2020.09.18 2025.05.28 Literature Database
WAFFLE: Watermarking in Federated Learning Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22 WatermarkingPoisoningMachine Learning Application 2020.08.17 2025.05.28 Literature Database
Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13 WatermarkingCode Change AnalysisSecurity Analysis 2020.08.13 2025.05.28 Literature Database
Deep-Lock: Secure Authorization for Deep Neural Networks Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18 WatermarkingSecurity AnalysisMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11 WatermarkingData Extraction and AnalysisInformation Security 2020.08.11 2025.05.28 Literature Database