Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01 Adversarial ExampleAdversarial attackWatermark Evaluation 2023.06.01 2025.05.28 Literature Database
A Note On Interpreting Canary Exposure Authors: Matthew Jagielski | Published: 2023-05-31 | Updated: 2023-06-02 Privacy Protection MethodMembership InferenceWatermark Evaluation 2023.05.31 2025.05.28 Literature Database
Differential Privacy with Random Projections and Sign Random Projections Authors: Ping Li, Xiaoyun Li | Published: 2023-05-22 | Updated: 2023-06-13 Data Privacy AssessmentPrivacy Enhancing TechnologyWatermark Evaluation 2023.05.22 2025.05.28 Literature Database
Perfectly Secure Steganography Using Minimum Entropy Coupling Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30 Privacy TechniqueWatermark EvaluationCommunication Model 2022.10.24 2025.05.28 Literature Database
Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence Authors: Carles Domingo-Enrich, Youssef Mroueh | Published: 2022-05-27 Privacy AssessmentFrameworkWatermark Evaluation 2022.05.27 2025.05.28 Literature Database
Differentially Private AUC Computation in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang | Published: 2022-05-24 Client-Side ComponentData CollectionWatermark Evaluation 2022.05.24 2025.05.28 Literature Database
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09 Model Performance EvaluationDeep Learning MethodWatermark Evaluation 2021.03.09 2025.05.28 Literature Database
Privacy-preserving feature selection: A survey and proposing a new set of protocols Authors: Javad Rahimipour Anaraki, Saeed Samet | Published: 2020-08-17 Privacy-Preserving Data MiningEvaluation MethodWatermark Evaluation 2020.08.17 2025.05.28 Literature Database
ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense Authors: Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi | Published: 2020-01-02 | Updated: 2020-10-16 Adversarial LearningWatermark EvaluationEffectiveness Analysis of Defense Methods 2020.01.02 2025.05.28 Literature Database
secml: A Python Library for Secure and Explainable Machine Learning Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio | Published: 2019-12-20 | Updated: 2022-05-13 PoisoningAdversarial LearningWatermark Evaluation 2019.12.20 2025.05.28 Literature Database