Watermark Evaluation

Signal Watermark on Large Language Models

Authors: Zhenyu Xu, Victor S. Sheng | Published: 2024-10-09
LLM Performance Evaluation
Watermarking
Watermark Evaluation

Watermarking Decision Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06
Watermarking
Cybersecurity
Watermark Evaluation

A Watermark for Black-Box Language Models

Authors: Dara Bahri, John Wieting, Dana Alon, Donald Metzler | Published: 2024-10-02
LLM Performance Evaluation
Watermarking
Watermark Evaluation

Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking

Authors: Aakash Varma Nadimpalli, Ajita Rattani | Published: 2024-10-02
Watermarking
Watermark Robustness
Watermark Evaluation

Multi-Designated Detector Watermarking for Language Models

Authors: Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, Yue Yu | Published: 2024-09-26 | Updated: 2024-10-01
LLM Security
Watermarking
Watermark Evaluation

Boosting Certified Robustness for Time Series Classification with Efficient Self-Ensemble

Authors: Chang Dong, Zhengyang Li, Liangwei Zheng, Weitong Chen, Wei Emma Zhang | Published: 2024-09-04 | Updated: 2024-09-19
Adversarial Example
Evaluation Method
Watermark Evaluation

Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding

Authors: Jonggyu Jang, Hyeonsu Lyu, Seongjin Hwang, Hyun Jong Yang | Published: 2024-08-08
Watermarking
Watermark Evaluation
Face Recognition System

Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness

Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20
Trust Evaluation Module
Evaluation Method
Watermark Evaluation

Can Go AIs be adversarially robust?

Authors: Tom Tseng, Euan McLean, Kellin Pelrine, Tony T. Wang, Adam Gleave | Published: 2024-06-18 | Updated: 2025-01-14
Model Performance Evaluation
Attack Method
Watermark Evaluation

Auditing Differential Privacy Guarantees Using Density Estimation

Authors: Antti Koskela, Jafar Mohammadi | Published: 2024-06-07 | Updated: 2024-10-11
Privacy Protection Method
Evaluation Method
Watermark Evaluation