$$\mathbf{L^2\cdot M = C^2}$$ Large Language Models are Covert Channels Authors: Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom | Published: 2024-05-24 | Updated: 2024-10-07 LLM Performance EvaluationWatermarkingSecure Communication Channel 2024.05.24 2025.05.27 Literature Database
A Simple Solution for Homomorphic Evaluation on Large Intervals Authors: John Chiang | Published: 2024-05-24 AlgorithmWatermarkingComputational Efficiency 2024.05.24 2025.05.27 Literature Database
AdjointDEIS: Efficient Gradients for Diffusion Models Authors: Zander W. Blasingame, Chen Liu | Published: 2024-05-23 | Updated: 2025-01-21 WatermarkingCompliance with Ethical GuidelinesOptimization Problem 2024.05.23 2025.05.27 Literature Database
Memory Scraping Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes Authors: Bharadwaj Madabhushi, Sandip Kundu, Daniel Holcomb | Published: 2024-05-22 FPGAWatermarkingMemory Management Method 2024.05.22 2025.05.27 Literature Database
Naturally Private Recommendations with Determinantal Point Processes Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22 WatermarkingPrivacy Protection MethodWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22 WatermarkingWatermark RobustnessWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
Geometry-Aware Instrumental Variable Regression Authors: Heiner Kremer, Bernhard Schölkopf | Published: 2024-05-19 WatermarkingOptimization ProblemEvaluation Method 2024.05.19 2025.05.27 Literature Database
SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman | Published: 2024-05-17 WatermarkingImage Feature ExtractionAgricultural Data Privacy 2024.05.17 2025.05.27 Literature Database
The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks Authors: Ziquan Liu, Yufei Cui, Yan Yan, Yi Xu, Xiangyang Ji, Xue Liu, Antoni B. Chan | Published: 2024-05-14 WatermarkingQuantification of UncertaintyAdversarial Training 2024.05.14 2025.05.27 Literature Database
Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security Authors: Leroy Jacob Valencia | Published: 2024-05-09 WatermarkingCybersecurityCompliance with Ethical Guidelines 2024.05.09 2025.05.27 Literature Database