Detecting LLM-Generated Peer Reviews Authors: Vishisht Rao, Aounon Kumar, Himabindu Lakkaraju, Nihar B. Shah | Published: 2025-03-20 | Updated: 2025-05-19 Prompt InjectionDigital Watermarking for Generative AIWatermark Design 2025.03.20 2025.05.27 Literature Database
How Well Can Differential Privacy Be Audited in One Run? Authors: Amit Keinan, Moshe Shenfeld, Katrina Ligett | Published: 2025-03-10 | Updated: 2025-05-26 Privacy Issues監査手法Watermark Design 2025.03.10 2025.05.28 Literature Database
SoK: Decentralized AI (DeAI) Authors: Zhipeng Wang, Rui Sun, Elizabeth Lui, Vatsal Shah, Xihan Xiong, Jiahao Sun, Davide Crapis, William Knottenbelt | Published: 2024-11-26 | Updated: 2025-04-16 Blockchain IntegrationDistributed LearningWatermark Design 2024.11.26 2025.05.27 Literature Database
Large Language Models as Carriers of Hidden Messages Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05 AlgorithmFingerprinting MethodWatermark Design 2024.06.04 2025.05.27 Literature Database
Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference Authors: Ruying Bao, Sihang Liang, Qingcan Wang | Published: 2018-05-21 | Updated: 2018-09-29 Certified RobustnessAdversarial Attack DetectionWatermark Design 2018.05.21 2025.05.28 Literature Database
Adversarial Frontier Stitching for Remote Neural Network Watermarking Authors: Erwan Le Merrer, Patrick Perez, Gilles Trédan | Published: 2017-11-06 | Updated: 2019-08-07 Adversarial ExampleAdversarial LearningWatermark Design 2017.11.06 2025.05.28 Literature Database