Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography Authors: Minhao Bai. Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang | Published: 2024-05-15 LLM Performance EvaluationDomain IndependenceWatermark Evaluation 2024.05.15 2025.05.27 Literature Database
Model Reconstruction Using Counterfactual Explanations: A Perspective From Polytope Theory Authors: Pasan Dissanayake, Sanghamitra Dutta | Published: 2024-05-08 | Updated: 2024-11-05 Model Performance EvaluationModel Extraction AttackWatermark Evaluation 2024.05.08 2025.05.27 Literature Database
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack Authors: Kaiyi Pang, Tao Qi, Chuhan Wu, Minhao Bai, Minghu Jiang, Yongfeng Huang | Published: 2024-05-03 | Updated: 2025-01-12 WatermarkingPrompt InjectionWatermark Evaluation 2024.05.03 2025.05.27 Literature Database
Why You Should Not Trust Interpretations in Machine Learning: Adversarial Attacks on Partial Dependence Plots Authors: Xi Xin, Giles Hooker, Fei Huang | Published: 2024-04-29 | Updated: 2024-05-01 Model InterpretabilityAdversarial TrainingWatermark Evaluation 2024.04.29 2025.05.27 Literature Database
Attacking Bayes: On the Adversarial Robustness of Bayesian Neural Networks Authors: Yunzhen Feng, Tim G. J. Rudner, Nikolaos Tsilivis, Julia Kempe | Published: 2024-04-27 Quantification of UncertaintyAdversarial ExampleWatermark Evaluation 2024.04.27 2025.05.27 Literature Database
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape Authors: Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath | Published: 2024-04-24 PoisoningWatermark EvaluationDefense Method 2024.04.24 2025.05.27 Literature Database
Chain of trust: Unraveling references among Common Criteria certified products Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas | Published: 2024-04-22 | Updated: 2024-08-19 Dependency Risk AssessmentEvaluation MethodWatermark Evaluation 2024.04.22 2025.05.27 Literature Database
Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21 Membership InferenceWatermark RobustnessWatermark Evaluation 2024.04.21 2025.05.27 Literature Database
Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03 WatermarkingPhysical layer securityWatermark Evaluation 2024.04.03 2025.05.27 Literature Database
Can Biases in ImageNet Models Explain Generalization? Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01 BiasModel Performance EvaluationWatermark Evaluation 2024.04.01 2025.05.27 Literature Database