Bilateral Differentially Private Vertical Federated Boosted Decision Trees Authors: Bokang Zhang, Zhikun Zhang, Haodong Jiang, Yang Liu, Lihao Zheng, Yuxiao Zhou, Shuaiting Huang, Junfeng Wu | Published: 2025-04-30 プライバシーリスク管理差分プライバシー透かし設計 2025.04.30 2025.05.12 Literature Database
Watermarking Needs Input Repetition Masking Authors: David Khachaturov, Robert Mullins, Ilia Shumailov, Sumanth Dathathri | Published: 2025-04-16 LLM性能評価プロンプトの検証透かし設計 2025.04.16 2025.05.12 Literature Database
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16 プライバシー保護プロトコル性能評価手法透かし設計 2025.04.16 2025.05.12 Literature Database
Support is All You Need for Certified VAE Training Authors: Changming Xu, Debangshu Banerjee, Deepak Vasisht, Gagandeep Singh | Published: 2025-04-16 学習の改善敵対的攻撃透かし設計 2025.04.16 2025.05.12 Literature Database
Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs Authors: Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen | Published: 2025-04-08 効率的証明システム安全な算術計算透かし設計 2025.04.08 2025.05.12 Literature Database
Detecting LLM-Written Peer Reviews Authors: Vishisht Rao, Aounon Kumar, Himabindu Lakkaraju, Nihar B. Shah | Published: 2025-03-20 プロンプトインジェクション生成AI向け電子透かし透かし設計 2025.03.20 2025.05.12 Literature Database
SoK: Decentralized AI (DeAI) Authors: Zhipeng Wang, Rui Sun, Elizabeth Lui, Vatsal Shah, Xihan Xiong, Jiahao Sun, Davide Crapis, William Knottenbelt | Published: 2024-11-26 | Updated: 2025-04-16 ブロックチェーン統合分散学習透かし設計 2024.11.26 2025.05.12 Literature Database
Large Language Models as Carriers of Hidden Messages Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05 アルゴリズムフィンガープリンティング手法透かし設計 2024.06.04 2025.05.12 Literature Database
Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference Authors: Ruying Bao, Sihang Liang, Qingcan Wang | Published: 2018-05-21 | Updated: 2018-09-29 モデルの頑健性保証敵対的攻撃検出透かし設計 2018.05.21 2025.05.13 Literature Database
Adversarial Frontier Stitching for Remote Neural Network Watermarking Authors: Erwan Le Merrer, Patrick Perez, Gilles Trédan | Published: 2017-11-06 | Updated: 2019-08-07 敵対的サンプル敵対的学習透かし設計 2017.11.06 2025.05.13 Literature Database