Generalizable and Interpretable RF Fingerprinting with Shapelet-Enhanced Large Language Models Authors: Tianya Zhao, Junqing Zhang, Haowen Xu, Xiaoyan Sun, Jun Dai, Xuyu Wang | Published: 2026-02-03 LLM Performance EvaluationFingerprinting MethodPrompt validation 2026.02.03 2026.02.05 Literature Database
DNF: Dual-Layer Nested Fingerprinting for Large Language Model Intellectual Property Protection Authors: Zhenhua Xu, Yiran Zhao, Mengting Zhong, Dezhang Kong, Changting Lin, Tong Qiao, Meng Han | Published: 2026-01-13 Fingerprinting MethodPrivacy ProtectionRobustness of Watermarking Techniques 2026.01.13 2026.01.15 Literature Database
CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of Large Language Models Authors: Zhenzhen Ren, GuoBiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang | Published: 2025-05-22 LLM SecurityFingerprinting MethodModel Identification 2025.05.22 2025.05.28 Literature Database
DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection Authors: Yuliang Yan, Haochun Tang, Shuo Yan, Enyan Dai | Published: 2025-05-22 Fingerprinting MethodPrompt InjectionModel Identification 2025.05.22 2025.05.28 Literature Database
FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition Authors: Zhenhua Xu, Wenpeng Xing, Zhebo Wang, Chang Hu, Chen Jie, Meng Han | Published: 2024-09-13 LLM SecurityFingerprinting MethodModel Performance Evaluation 2024.09.13 2025.05.27 Literature Database
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01 Data CollectionFingerprinting MethodPrivacy Protection 2024.09.01 2025.05.27 Literature Database
Hey, That’s My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique Authors: Mark Russinovich, Ahmed Salem | Published: 2024-07-15 | Updated: 2025-06-12 Indirect Prompt InjectionFingerprinting MethodPrompt Injection 2024.07.15 2025.06.14 Literature Database
Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation Authors: Zhaoyi Lu, Wenchao Xu, Ming Tu, Xin Xie, Cunqing Hua, Nan Cheng | Published: 2024-06-11 | Updated: 2024-06-12 WatermarkingFingerprinting MethodSignal Perturbation Method 2024.06.11 2025.05.27 Literature Database
Large Language Models as Carriers of Hidden Messages Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05 AlgorithmFingerprinting MethodWatermark Design 2024.06.04 2025.05.27 Literature Database
ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10 Query Generation MethodFingerprinting MethodPrompt Injection 2024.05.03 2025.05.27 Literature Database