Watermarking

$$\mathbf{L^2\cdot M = C^2}$$ Large Language Models are Covert Channels

Authors: Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom | Published: 2024-05-24 | Updated: 2024-10-07
LLM Performance Evaluation
Watermarking
Secure Communication Channel

A Simple Solution for Homomorphic Evaluation on Large Intervals

Authors: John Chiang | Published: 2024-05-24
Algorithm
Watermarking
Computational Efficiency

AdjointDEIS: Efficient Gradients for Diffusion Models

Authors: Zander W. Blasingame, Chen Liu | Published: 2024-05-23 | Updated: 2025-01-21
Watermarking
Compliance with Ethical Guidelines
Optimization Problem

Memory Scraping Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes

Authors: Bharadwaj Madabhushi, Sandip Kundu, Daniel Holcomb | Published: 2024-05-22
FPGA
Watermarking
Memory Management Method

Naturally Private Recommendations with Determinantal Point Processes

Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22
Watermarking
Privacy Protection Method
Watermark Evaluation

WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness

Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22
Watermarking
Watermark Robustness
Watermark Evaluation

Geometry-Aware Instrumental Variable Regression

Authors: Heiner Kremer, Bernhard Schölkopf | Published: 2024-05-19
Watermarking
Optimization Problem
Evaluation Method

SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification

Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman | Published: 2024-05-17
Watermarking
Image Feature Extraction
Agricultural Data Privacy

The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks

Authors: Ziquan Liu, Yufei Cui, Yan Yan, Yi Xu, Xiangyang Ji, Xue Liu, Antoni B. Chan | Published: 2024-05-14
Watermarking
Quantification of Uncertainty
Adversarial Training

Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security

Authors: Leroy Jacob Valencia | Published: 2024-05-09
Watermarking
Cybersecurity
Compliance with Ethical Guidelines