Watermarking

Optimal Provable Robustness of Quantum Classification via Quantum Hypothesis Testing

Authors: Maurice Weber, Nana Liu, Bo Li, Ce Zhang, Zhikuan Zhao | Published: 2020-09-21 | Updated: 2021-05-26
Watermarking
Robustness
Quantum Machine Learning

Feature Distillation With Guided Adversarial Contrastive Learning

Authors: Tao Bai, Jinnan Chen, Jun Zhao, Bihan Wen, Xudong Jiang, Alex Kot | Published: 2020-09-21
Watermarking
Adversarial Example
Adversarial Training

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models

Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17
Watermarking
Data Generation
Membership Inference

WAFFLE: Watermarking in Federated Learning

Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22
Watermarking
Poisoning
Machine Learning Application

Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry

Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13
Watermarking
Code Change Analysis
Security Analysis

Deep-Lock: Secure Authorization for Deep Neural Networks

Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18
Watermarking
Security Analysis
Machine Learning Method

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11
Watermarking
Data Extraction and Analysis
Information Security

Stronger and Faster Wasserstein Adversarial Attacks

Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06
Watermarking
Adversarial Learning
Adversarial attack

New Directions in Automated Traffic Analysis

Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal | Published: 2020-08-06 | Updated: 2021-10-19
Watermarking
Data Extraction and Analysis
Machine Learning

Training DNN Model with Secret Key for Model Protection

Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-08-06
Watermarking
Adversarial Learning
Machine Learning