Fingerprinting Method

Generalizable and Interpretable RF Fingerprinting with Shapelet-Enhanced Large Language Models

Authors: Tianya Zhao, Junqing Zhang, Haowen Xu, Xiaoyan Sun, Jun Dai, Xuyu Wang | Published: 2026-02-03
LLM Performance Evaluation
Fingerprinting Method
Prompt validation

DNF: Dual-Layer Nested Fingerprinting for Large Language Model Intellectual Property Protection

Authors: Zhenhua Xu, Yiran Zhao, Mengting Zhong, Dezhang Kong, Changting Lin, Tong Qiao, Meng Han | Published: 2026-01-13
Fingerprinting Method
Privacy Protection
Robustness of Watermarking Techniques

CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of Large Language Models

Authors: Zhenzhen Ren, GuoBiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang | Published: 2025-05-22
LLM Security
Fingerprinting Method
Model Identification

DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection

Authors: Yuliang Yan, Haochun Tang, Shuo Yan, Enyan Dai | Published: 2025-05-22
Fingerprinting Method
Prompt Injection
Model Identification

FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition

Authors: Zhenhua Xu, Wenpeng Xing, Zhebo Wang, Chang Hu, Chen Jie, Meng Han | Published: 2024-09-13
LLM Security
Fingerprinting Method
Model Performance Evaluation

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints

Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01
Data Collection
Fingerprinting Method
Privacy Protection

Hey, That’s My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique

Authors: Mark Russinovich, Ahmed Salem | Published: 2024-07-15 | Updated: 2025-06-12
Indirect Prompt Injection
Fingerprinting Method
Prompt Injection

Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation

Authors: Zhaoyi Lu, Wenchao Xu, Ming Tu, Xin Xie, Cunqing Hua, Nan Cheng | Published: 2024-06-11 | Updated: 2024-06-12
Watermarking
Fingerprinting Method
Signal Perturbation Method

Large Language Models as Carriers of Hidden Messages

Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05
Algorithm
Fingerprinting Method
Watermark Design

ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models

Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10
Query Generation Method
Fingerprinting Method
Prompt Injection