Watermark Robustness

An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04
Algorithm Design
Computational Complexity
Watermark Robustness

When Vision Fails: Text Attacks Against ViT and OCR

Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12
Performance Evaluation
Attack Pattern Extraction
Watermark Robustness

Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation

Authors: Tzu-Yun Chien, Chih-Ya Shen | Published: 2022-08-10
Customization Method
Adversarial Example
Watermark Robustness

Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15
Algorithm
Experimental Validation
Watermark Robustness

Defending against adversarial attacks by randomized diversification

Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-04-01
Adversarial Example Detection
Adversarial Attack Detection
Watermark Robustness