Data Generation

DUAW: Data-free Universal Adversarial Watermark against Stable Diffusion Customization

Authors: Xiaoyu Ye, Hao Huang, Jiaqi An, Yongtao Wang | Published: 2023-08-19
Customization Method
Data Generation
Watermark Robustness

Large-Scale Public Data Improves Differentially Private Image Generation Quality

Authors: Ruihan Wu, Chuan Guo, Kamalika Chaudhuri | Published: 2023-08-04
Data Generation
Privacy Protection Method
Convergence Property

URET: Universal Robustness Evaluation Toolkit (for Evasion)

Authors: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin | Published: 2023-08-03
Data Generation
Adversarial Example
Adversarial attack

Differentially Private Linear Regression with Linked Data

Authors: Shurong Lin, Elliot Paquette, Eric D. Kolaczyk | Published: 2023-08-01 | Updated: 2024-05-08
Secure Logistic Regression
Data Generation
Privacy Protection Method

Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel

Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03
Data Generation
Vulnerability detection
Quantum Cryptography Technology

The GANfather: Controllable generation of malicious activity to improve defence systems

Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25
Cybersecurity
Data Generation
Classification of Malicious Actors

The Looming Threat of Fake and LLM-generated LinkedIn Profiles: Challenges and Opportunities for Detection and Prevention

Authors: Navid Ayoobi, Sadat Shahriar, Arjun Mukherjee | Published: 2023-07-21
Data Generation
Prompt Injection
Analysis of Detection Methods

ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown

Authors: Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard | Published: 2023-07-10
Data Generation
Digital Forensics
Prompt Engineering

Censoring chemical data to mitigate dual use risk

Authors: Quintina L. Campbell, Jonathan Herington, Andrew D. White | Published: 2023-04-20
Data Generation
Privacy Technique
Safety Alignment

Few-shot Weakly-supervised Cybersecurity Anomaly Detection

Authors: Rahul Kale, Vrizlynn L. L. Thing | Published: 2023-04-15
Few-Shot Learning
Data Generation
Training Data Generation