Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03 Privacy AnalysisAdversarial ExampleWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
CyberGym: Evaluating AI Agents’ Cybersecurity Capabilities with Real-World Vulnerabilities at Scale Authors: Zhun Wang, Tianneng Shi, Jingxuan He, Matthew Cai, Jialin Zhang, Dawn Song | Published: 2025-06-03 Prompt InjectionDynamic Analysis MethodWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09 RAGWatermarkingWatermark Evaluation 2025.01.09 2025.05.27 Literature Database
RTLMarker: Protecting LLM-Generated RTL Copyright via a Hardware Watermarking Framework Authors: Kun Wang, Kaiyan Chang, Mengdi Wang, Xinqi Zou, Haobo Xu, Yinhe Han, Ying Wang | Published: 2025-01-05 Prompt InjectionWatermark RobustnessWatermark Evaluation 2025.01.05 2025.05.27 Literature Database
A Statistical Hypothesis Testing Framework for Data Misappropriation Detection in Large Language Models Authors: Yinpeng Cai, Lexin Li, Linjun Zhang | Published: 2025-01-05 FrameworkHypothesis TestingWatermark Evaluation 2025.01.05 2025.05.27 Literature Database
FreqMark: Frequency-Based Watermark for Sentence-Level Detection of LLM-Generated Text Authors: Zhenyu Xu, Kun Zhang, Victor S. Sheng | Published: 2024-10-09 WatermarkingWatermark RobustnessWatermark Evaluation 2024.10.09 2025.05.27 Literature Database
Signal Watermark on Large Language Models Authors: Zhenyu Xu, Victor S. Sheng | Published: 2024-10-09 LLM Performance EvaluationWatermarkingWatermark Evaluation 2024.10.09 2025.05.27 Literature Database
Watermarking Decision Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06 WatermarkingCybersecurityWatermark Evaluation 2024.10.06 2025.05.27 Literature Database
A Watermark for Black-Box Language Models Authors: Dara Bahri, John Wieting, Dana Alon, Donald Metzler | Published: 2024-10-02 LLM Performance EvaluationWatermarkingWatermark Evaluation 2024.10.02 2025.05.27 Literature Database
Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking Authors: Aakash Varma Nadimpalli, Ajita Rattani | Published: 2024-10-02 WatermarkingWatermark RobustnessWatermark Evaluation 2024.10.02 2025.05.27 Literature Database