PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification Authors: Hongwei Yao, Jian Lou, Kui Ren, Zhan Qin | Published: 2023-08-05 | Updated: 2023-11-28 Soft Prompt OptimizationPrompt InjectionWatermark Robustness 2023.08.05 2025.05.28 Literature Database
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud Authors: Pinglan Liu, Wensheng Zhang | Published: 2023-08-02 Multi-Party ComputationDeep Learning MethodWatermark Robustness 2023.08.02 2025.05.28 Literature Database
Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03 Adversarial ExampleAdversarial attackWatermark Robustness 2023.08.02 2025.05.28 Literature Database
Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi | Published: 2023-08-01 Watermarking Settings for Medical DataWatermark RobustnessFederated Learning 2023.08.01 2025.05.28 Literature Database
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30 CybersecurityAdversarial Spectrum Attack DetectionWatermark Robustness 2023.07.30 2025.05.28 Literature Database
A LLM Assisted Exploitation of AI-Guardian Authors: Nicholas Carlini | Published: 2023-07-20 Prompt InjectionMembership InferenceWatermark Robustness 2023.07.20 2025.05.28 Literature Database
MasterKey: Automated Jailbreak Across Multiple Large Language Model Chatbots Authors: Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu | Published: 2023-07-16 | Updated: 2023-10-25 Data LeakagePrompt InjectionWatermark Robustness 2023.07.16 2025.05.28 Literature Database
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04 Algorithm DesignComputational ComplexityWatermark Robustness 2023.07.04 2025.05.28 Literature Database
When Vision Fails: Text Attacks Against ViT and OCR Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12 Performance EvaluationAttack Pattern ExtractionWatermark Robustness 2023.06.12 2025.05.28 Literature Database
Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation Authors: Tzu-Yun Chien, Chih-Ya Shen | Published: 2022-08-10 Customization MethodAdversarial ExampleWatermark Robustness 2022.08.10 2025.05.28 Literature Database