Watermarking Technology

Remotely Detectable Robot Policy Watermarking

Authors: Michael Amir, Manon Flageat, Amanda Prorok | Published: 2025-12-17
信号処理技術
Reinforcement Learning Algorithm
Watermarking Technology

AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data

Authors: Benjamin Blakely, Yeni Li, Akshay Dave, Derek Kultgen, Rick Vilim | Published: 2025-12-01
Cybersecurity
Anomaly Detection Method
Watermarking Technology

Evaluation of Real-Time Mitigation Techniques for Cyber Security in IEC 61850 / IEC 62351 Substations

Authors: Akila Herath, Chen-Ching Liu, Junho Hong, Kuchan Park | Published: 2025-11-24
DoS Mitigation
Anomaly Detection Algorithm
Watermarking Technology

PVMark: Enabling Public Verifiability for LLM Watermarking Schemes

Authors: Haohua Duan, Liyao Xiang, Xin Zhang | Published: 2025-10-30
Model Extraction Attack
公的検証可能性
Watermarking Technology

Training-Free In-Context Forensic Chain for Image Manipulation Detection and Localization

Authors: Rui Chen, Bin Liu, Changtao Miao, Xinghao Wang, Yi Li, Tao Gong, Qi Chu, Nenghai Yu | Published: 2025-10-11 | Updated: 2025-10-27
トリガーベースの透かし
画像処理手法
Watermarking Technology

LLM Jailbreak Detection for (Almost) Free!

Authors: Guorui Chen, Yifan Xia, Xiaojun Jia, Zhijiang Li, Philip Torr, Jindong Gu | Published: 2025-09-18
Large Language Model
Evaluation Method
Watermarking Technology

Yet Another Watermark for Large Language Models

Authors: Siyuan Bao, Ying Shi, Zhiguang Yang, Hanzhou Wu, Xinpeng Zhang | Published: 2025-09-16
Prompt leaking
Large Language Model
Watermarking Technology

ZKPROV: A Zero-Knowledge Approach to Dataset Provenance for Large Language Models

Authors: Mina Namazi, Alexander Nemecek, Erman Ayday | Published: 2025-06-26
Privacy Protection
Large Language Model
Watermarking Technology

FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular Graph Convolutional Networks

Authors: Zhaoxuan Kan, Husheng Han, Shangyi Shi, Tenghui Hua, Hang Lu, Xiaowei Li, Jianan Mu, Xing Hu | Published: 2025-06-12
ノード最適化手法
Privacy Enhancing Technology
Watermarking Technology

Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge Proofs

Authors: Filippo Scaramuzza, Giovanni Quattrocchi, Damian A. Tamburri | Published: 2025-05-26
Privacy Issues
Model evaluation methods
Watermarking Technology