Watermarking

Memory Scraping Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes

Authors: Bharadwaj Madabhushi, Sandip Kundu, Daniel Holcomb | Published: 2024-05-22
FPGA
Watermarking
Memory Management Method

Naturally Private Recommendations with Determinantal Point Processes

Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22
Watermarking
Privacy Protection Method
Watermark Evaluation

WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness

Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22
Watermarking
Watermark Robustness
Watermark Evaluation

Geometry-Aware Instrumental Variable Regression

Authors: Heiner Kremer, Bernhard Schölkopf | Published: 2024-05-19
Watermarking
Optimization Problem
Evaluation Method

SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification

Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman | Published: 2024-05-17
Watermarking
Image Feature Extraction
Agricultural Data Privacy

The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks

Authors: Ziquan Liu, Yufei Cui, Yan Yan, Yi Xu, Xiangyang Ji, Xue Liu, Antoni B. Chan | Published: 2024-05-14
Watermarking
Quantification of Uncertainty
Adversarial Training

Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security

Authors: Leroy Jacob Valencia | Published: 2024-05-09
Watermarking
Cybersecurity
Compliance with Ethical Guidelines

Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models

Authors: Yang Bai, Ge Pei, Jindong Gu, Yong Yang, Xingjun Ma | Published: 2024-05-09 | Updated: 2024-05-20
LLM Security
Watermarking
Weapon Ownership

Revisiting Character-level Adversarial Attacks for Language Models

Authors: Elias Abad Rocamora, Yongtao Wu, Fanghui Liu, Grigorios G. Chrysos, Volkan Cevher | Published: 2024-05-07 | Updated: 2024-09-04
Watermarking
Loss Function
Attack Method

Differentially Private Post-Processing for Fair Regression

Authors: Ruicheng Xian, Qiaobo Li, Gautam Kamath, Han Zhao | Published: 2024-05-07
Watermarking
Privacy Protection Method
Fairness evaluation