Signal Watermark on Large Language Models Authors: Zhenyu Xu, Victor S. Sheng | Published: 2024-10-09 LLM Performance EvaluationWatermarkingWatermark Evaluation 2024.10.09 2025.05.27 Literature Database
Watermarking Decision Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06 WatermarkingCybersecurityWatermark Evaluation 2024.10.06 2025.05.27 Literature Database
A Watermark for Black-Box Language Models Authors: Dara Bahri, John Wieting, Dana Alon, Donald Metzler | Published: 2024-10-02 LLM Performance EvaluationWatermarkingWatermark Evaluation 2024.10.02 2025.05.27 Literature Database
Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking Authors: Aakash Varma Nadimpalli, Ajita Rattani | Published: 2024-10-02 WatermarkingWatermark RobustnessWatermark Evaluation 2024.10.02 2025.05.27 Literature Database
Multi-Designated Detector Watermarking for Language Models Authors: Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, Yue Yu | Published: 2024-09-26 | Updated: 2024-10-01 LLM SecurityWatermarkingWatermark Evaluation 2024.09.26 2025.05.27 Literature Database
Boosting Certified Robustness for Time Series Classification with Efficient Self-Ensemble Authors: Chang Dong, Zhengyang Li, Liangwei Zheng, Weitong Chen, Wei Emma Zhang | Published: 2024-09-04 | Updated: 2024-09-19 Adversarial ExampleEvaluation MethodWatermark Evaluation 2024.09.04 2025.05.27 Literature Database
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding Authors: Jonggyu Jang, Hyeonsu Lyu, Seongjin Hwang, Hyun Jong Yang | Published: 2024-08-08 WatermarkingWatermark EvaluationFace Recognition System 2024.08.08 2025.05.27 Literature Database
Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20 Trust Evaluation ModuleEvaluation MethodWatermark Evaluation 2024.06.25 2025.05.27 Literature Database
Can Go AIs be adversarially robust? Authors: Tom Tseng, Euan McLean, Kellin Pelrine, Tony T. Wang, Adam Gleave | Published: 2024-06-18 | Updated: 2025-01-14 Model Performance EvaluationAttack MethodWatermark Evaluation 2024.06.18 2025.05.27 Literature Database
Auditing Differential Privacy Guarantees Using Density Estimation Authors: Antti Koskela, Jafar Mohammadi | Published: 2024-06-07 | Updated: 2024-10-11 Privacy Protection MethodEvaluation MethodWatermark Evaluation 2024.06.07 2025.05.27 Literature Database