Watermarking

Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection

Authors: Sachin Shukla, Omid Mirzaei | Published: 2024-08-29 | Updated: 2024-09-04
Watermarking
Spam Detection
Visual Similarity Detection

Mitigating Noise Detriment in Differentially Private Federated Learning with Model Pre-training

Authors: Huitong Jin, Yipeng Zhou, Laizhong Cui, Quan Z. Sheng | Published: 2024-08-18
Watermarking
Privacy Protection Method
Model Performance Evaluation

Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning

Authors: Joon Kim, Sejin Park | Published: 2024-08-15
Watermarking
Poisoning
Defense Method

SAGE-RT: Synthetic Alignment data Generation for Safety Evaluation and Red Teaming

Authors: Anurakt Kumar, Divyanshu Kumar, Jatan Loya, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2024-08-14
Watermarking
Dataset Generation
Safety Alignment

Fooling SHAP with Output Shuffling Attacks

Authors: Jun Yuan, Aritra Dasgupta | Published: 2024-08-12
AI Compliance
Watermarking
Bias

Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption

Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12
Integration of FL and HE
Watermarking
Privacy Protection Method

h4rm3l: A language for Composable Jailbreak Attack Synthesis

Authors: Moussa Koulako Bala Doumbouya, Ananjan Nandi, Gabriel Poesia, Davide Ghilardi, Anna Goldie, Federico Bianchi, Dan Jurafsky, Christopher D. Manning | Published: 2024-08-09 | Updated: 2025-03-25
Watermarking
Prompt Injection
Prompt Engineering

Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding

Authors: Jonggyu Jang, Hyeonsu Lyu, Seongjin Hwang, Hyun Jong Yang | Published: 2024-08-08
Watermarking
Watermark Evaluation
Face Recognition System

LaFA: Latent Feature Attacks on Non-negative Matrix Factorization

Authors: Minh Vu, Ben Nebgen, Erik Skau, Geigh Zollicoffer, Juan Castorena, Kim Rasmussen, Boian Alexandrov, Manish Bhattarai | Published: 2024-08-07
Watermarking
Attack Method
Adversarial Example

On the Robustness of Malware Detectors to Adversarial Samples

Authors: Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kaafar | Published: 2024-08-05
Watermarking
Malware Classification
Adversarial Example