Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking Authors: Aakash Varma Nadimpalli, Ajita Rattani | Published: 2024-10-02 WatermarkingWatermark RobustnessWatermark Evaluation 2024.10.02 2025.05.27 Literature Database
SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning Authors: Minyeong Choe, Cheolhee Park, Changho Seo, Hyunil Kim | Published: 2024-09-23 | Updated: 2025-07-30 Backdoor AttackPoisoningWatermark Robustness 2024.09.23 2025.08.01 Literature Database
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective Authors: Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller | Published: 2024-09-10 WatermarkingAttack MethodWatermark Robustness 2024.09.10 2025.05.27 Literature Database
MCGMark: An Encodable and Robust Online Watermark for Tracing LLM-Generated Malicious Code Authors: Kaiwen Ning, Jiachi Chen, Qingyuan Zhong, Tao Zhang, Yanlin Wang, Wei Li, Jingwen Zhang, Jianxing Yu, Yuming Feng, Weizhe Zhang, Zibin Zheng | Published: 2024-08-02 | Updated: 2025-04-21 Code GenerationPrompt InjectionWatermark Robustness 2024.08.02 2025.05.27 Literature Database
Variational Randomized Smoothing for Sample-Wise Adversarial Robustness Authors: Ryo Hase, Ye Wang, Toshiaki Koike-Akino, Jing Liu, Kieran Parsons | Published: 2024-07-16 RegularizationWatermark RobustnessDefense Method 2024.07.16 2025.05.27 Literature Database
GENIE: Watermarking Graph Neural Networks for Link Prediction Authors: Venkata Sai Pranav Bachina, Ankit Gangwal, Aaryan Ajay Sharma, Charu Sharma | Published: 2024-06-07 | Updated: 2025-01-12 WatermarkingPrompt InjectionWatermark Robustness 2024.06.07 2025.05.27 Literature Database
WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22 WatermarkingWatermark RobustnessWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
ATTAXONOMY: Unpacking Differential Privacy Guarantees Against Practical Adversaries Authors: Rachel Cummings, Shlomi Hod, Jayshree Sarathy, Marika Swanberg | Published: 2024-05-02 Privacy Protection MethodReconstruction DurabilityWatermark Robustness 2024.05.02 2025.05.27 Literature Database
zkLLM: Zero Knowledge Proofs for Large Language Models Authors: Haochen Sun, Jason Li, Hongyang Zhang | Published: 2024-04-24 Prompt InjectionComputational EfficiencyWatermark Robustness 2024.04.24 2025.05.27 Literature Database
Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21 Membership InferenceWatermark RobustnessWatermark Evaluation 2024.04.21 2025.05.27 Literature Database