Instance-Level Data-Use Auditing of Visual ML Models Authors: Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter | Published: 2025-03-28 | Updated: 2025-09-16 データ毒性Detection of Model Extraction AttacksWatermarking Technology 2025.03.28 2025.09.18 Literature Database
Benchmarking Android Malware Detection: Traditional vs. Deep Learning Models Authors: Guojun Liu, Doina Caragea, Xinming Ou, Sankardas Roy | Published: 2025-02-20 | Updated: 2025-07-30 データセットの影響Review and InvestigationWatermarking Technology 2025.02.20 2025.08.01 Literature Database
A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27 Privacy IssuesWatermarking TechnologyFederated Learning 2025.01.22 2025.05.27 Literature Database
ExpShield: Safeguarding Web Text from Unauthorized Crawling and Language Modeling Exploitation Authors: Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong | Published: 2024-12-30 | Updated: 2025-05-07 Text Perturbation MethodBackdoor DetectionWatermarking Technology 2024.12.30 2025.05.27 Literature Database
CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21 Cyber Threat IntelligencePrompt leakingWatermarking Technology 2024.10.28 2025.05.27 Literature Database
“Yes, My LoRD.” Guiding Language Model Extraction with Locality Reinforced Distillation Authors: Zi Liang, Qingqing Ye, Yanyun Wang, Sen Zhang, Yaxin Xiao, Ronghua Li, Jianliang Xu, Haibo Hu | Published: 2024-09-04 | Updated: 2025-05-19 LLM SecurityModel Extraction AttackWatermarking Technology 2024.09.04 2025.05.28 Literature Database
Undetectable Watermarks for Language Models Authors: Miranda Christ, Sam Gunn, Or Zamir | Published: 2023-05-25 Prompt leakingDigital Watermarking for Generative AIWatermarking Technology 2023.05.25 2025.05.28 Literature Database
Graph Backdoor Authors: Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang | Published: 2020-06-21 | Updated: 2021-08-10 Graph Neural NetworkAttack MethodWatermarking Technology 2020.06.21 2025.05.28 Literature Database
Rotation-Equivariant Neural Networks for Privacy Protection Authors: Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang | Published: 2020-06-21 Machine Learning AlgorithmFeature Extraction MethodWatermarking Technology 2020.06.21 2025.05.28 Literature Database
Local Convolutions Cause an Implicit Bias towards High Frequency Adversarial Examples Authors: Josue Ortega Caro, Yilong Ju, Ryan Pyle, Sourav Dey, Wieland Brendel, Fabio Anselmi, Ankit Patel | Published: 2020-06-19 | Updated: 2023-03-08 Adversarial ExampleAdversarial LearningWatermarking Technology 2020.06.19 2025.05.28 Literature Database