DUAW: Data-free Universal Adversarial Watermark against Stable Diffusion Customization Authors: Xiaoyu Ye, Hao Huang, Jiaqi An, Yongtao Wang | Published: 2023-08-19 Customization MethodData GenerationWatermark Robustness 2023.08.19 2025.05.28 Literature Database
Large-Scale Public Data Improves Differentially Private Image Generation Quality Authors: Ruihan Wu, Chuan Guo, Kamalika Chaudhuri | Published: 2023-08-04 Data GenerationPrivacy Protection MethodConvergence Property 2023.08.04 2025.05.28 Literature Database
URET: Universal Robustness Evaluation Toolkit (for Evasion) Authors: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin | Published: 2023-08-03 Data GenerationAdversarial ExampleAdversarial attack 2023.08.03 2025.05.28 Literature Database
Differentially Private Linear Regression with Linked Data Authors: Shurong Lin, Elliot Paquette, Eric D. Kolaczyk | Published: 2023-08-01 | Updated: 2024-05-08 Secure Logistic RegressionData GenerationPrivacy Protection Method 2023.08.01 2025.05.28 Literature Database
Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03 Data GenerationVulnerability detectionQuantum Cryptography Technology 2023.08.01 2025.05.28 Literature Database
The GANfather: Controllable generation of malicious activity to improve defence systems Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25 CybersecurityData GenerationClassification of Malicious Actors 2023.07.25 2025.05.28 Literature Database
The Looming Threat of Fake and LLM-generated LinkedIn Profiles: Challenges and Opportunities for Detection and Prevention Authors: Navid Ayoobi, Sadat Shahriar, Arjun Mukherjee | Published: 2023-07-21 Data GenerationPrompt InjectionAnalysis of Detection Methods 2023.07.21 2025.05.28 Literature Database
ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown Authors: Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard | Published: 2023-07-10 Data GenerationDigital ForensicsPrompt Engineering 2023.07.10 2025.05.28 Literature Database
Censoring chemical data to mitigate dual use risk Authors: Quintina L. Campbell, Jonathan Herington, Andrew D. White | Published: 2023-04-20 Data GenerationPrivacy TechniqueSafety Alignment 2023.04.20 2025.05.28 Literature Database
Few-shot Weakly-supervised Cybersecurity Anomaly Detection Authors: Rahul Kale, Vrizlynn L. L. Thing | Published: 2023-04-15 Few-Shot LearningData GenerationTraining Data Generation 2023.04.15 2025.05.28 Literature Database