Optimal Provable Robustness of Quantum Classification via Quantum Hypothesis Testing Authors: Maurice Weber, Nana Liu, Bo Li, Ce Zhang, Zhikuan Zhao | Published: 2020-09-21 | Updated: 2021-05-26 WatermarkingRobustnessQuantum Machine Learning 2020.09.21 2025.05.28 Literature Database
Feature Distillation With Guided Adversarial Contrastive Learning Authors: Tao Bai, Jinnan Chen, Jun Zhao, Bihan Wen, Xudong Jiang, Alex Kot | Published: 2020-09-21 WatermarkingAdversarial ExampleAdversarial Training 2020.09.21 2025.05.28 Literature Database
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17 WatermarkingData GenerationMembership Inference 2020.09.18 2025.05.28 Literature Database
WAFFLE: Watermarking in Federated Learning Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22 WatermarkingPoisoningMachine Learning Application 2020.08.17 2025.05.28 Literature Database
Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13 WatermarkingCode Change AnalysisSecurity Analysis 2020.08.13 2025.05.28 Literature Database
Deep-Lock: Secure Authorization for Deep Neural Networks Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18 WatermarkingSecurity AnalysisMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11 WatermarkingData Extraction and AnalysisInformation Security 2020.08.11 2025.05.28 Literature Database
Stronger and Faster Wasserstein Adversarial Attacks Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06 WatermarkingAdversarial LearningAdversarial attack 2020.08.06 2025.05.28 Literature Database
New Directions in Automated Traffic Analysis Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal | Published: 2020-08-06 | Updated: 2021-10-19 WatermarkingData Extraction and AnalysisMachine Learning 2020.08.06 2025.05.28 Literature Database
Training DNN Model with Secret Key for Model Protection Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-08-06 WatermarkingAdversarial LearningMachine Learning 2020.08.06 2025.05.28 Literature Database