Watermark Evaluation

Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography

Authors: Minhao Bai. Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang | Published: 2024-05-15
LLM Performance Evaluation
Domain Independence
Watermark Evaluation

Model Reconstruction Using Counterfactual Explanations: A Perspective From Polytope Theory

Authors: Pasan Dissanayake, Sanghamitra Dutta | Published: 2024-05-08 | Updated: 2024-11-05
Model Performance Evaluation
Model Extraction Attack
Watermark Evaluation

ModelShield: Adaptive and Robust Watermark against Model Extraction Attack

Authors: Kaiyi Pang, Tao Qi, Chuhan Wu, Minhao Bai, Minghu Jiang, Yongfeng Huang | Published: 2024-05-03 | Updated: 2025-01-12
Watermarking
Prompt Injection
Watermark Evaluation

Why You Should Not Trust Interpretations in Machine Learning: Adversarial Attacks on Partial Dependence Plots

Authors: Xi Xin, Giles Hooker, Fei Huang | Published: 2024-04-29 | Updated: 2024-05-01
Model Interpretability
Adversarial Training
Watermark Evaluation

Attacking Bayes: On the Adversarial Robustness of Bayesian Neural Networks

Authors: Yunzhen Feng, Tim G. J. Rudner, Nikolaos Tsilivis, Julia Kempe | Published: 2024-04-27
Quantification of Uncertainty
Adversarial Example
Watermark Evaluation

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

Authors: Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath | Published: 2024-04-24
Poisoning
Watermark Evaluation
Defense Method

Chain of trust: Unraveling references among Common Criteria certified products

Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas | Published: 2024-04-22 | Updated: 2024-08-19
Dependency Risk Assessment
Evaluation Method
Watermark Evaluation

Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion

Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21
Membership Inference
Watermark Robustness
Watermark Evaluation

Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks

Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03
Watermarking
Physical layer security
Watermark Evaluation

Can Biases in ImageNet Models Explain Generalization?

Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01
Bias
Model Performance Evaluation
Watermark Evaluation