Watermark Evaluation

Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack

Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03
Privacy Analysis
Adversarial Example
Watermark Evaluation

CyberGym: Evaluating AI Agents’ Cybersecurity Capabilities with Real-World Vulnerabilities at Scale

Authors: Zhun Wang, Tianneng Shi, Jingxuan He, Matthew Cai, Jialin Zhang, Dawn Song | Published: 2025-06-03
Prompt Injection
Dynamic Analysis Method
Watermark Evaluation

RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models

Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09
RAG
Watermarking
Watermark Evaluation

RTLMarker: Protecting LLM-Generated RTL Copyright via a Hardware Watermarking Framework

Authors: Kun Wang, Kaiyan Chang, Mengdi Wang, Xinqi Zou, Haobo Xu, Yinhe Han, Ying Wang | Published: 2025-01-05
Prompt Injection
Watermark Robustness
Watermark Evaluation

A Statistical Hypothesis Testing Framework for Data Misappropriation Detection in Large Language Models

Authors: Yinpeng Cai, Lexin Li, Linjun Zhang | Published: 2025-01-05
Framework
Hypothesis Testing
Watermark Evaluation

FreqMark: Frequency-Based Watermark for Sentence-Level Detection of LLM-Generated Text

Authors: Zhenyu Xu, Kun Zhang, Victor S. Sheng | Published: 2024-10-09
Watermarking
Watermark Robustness
Watermark Evaluation

Signal Watermark on Large Language Models

Authors: Zhenyu Xu, Victor S. Sheng | Published: 2024-10-09
LLM Performance Evaluation
Watermarking
Watermark Evaluation

Watermarking Decision Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06
Watermarking
Cybersecurity
Watermark Evaluation

A Watermark for Black-Box Language Models

Authors: Dara Bahri, John Wieting, Dana Alon, Donald Metzler | Published: 2024-10-02
LLM Performance Evaluation
Watermarking
Watermark Evaluation

Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking

Authors: Aakash Varma Nadimpalli, Ajita Rattani | Published: 2024-10-02
Watermarking
Watermark Robustness
Watermark Evaluation