Chain of trust: Unraveling references among Common Criteria certified products Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas | Published: 2024-04-22 | Updated: 2024-08-19 Dependency Risk AssessmentEvaluation MethodWatermark Evaluation 2024.04.22 2025.05.27 Literature Database
Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21 Membership InferenceWatermark RobustnessWatermark Evaluation 2024.04.21 2025.05.27 Literature Database
Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03 WatermarkingPhysical layer securityWatermark Evaluation 2024.04.03 2025.05.27 Literature Database
Can Biases in ImageNet Models Explain Generalization? Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01 BiasModel Performance EvaluationWatermark Evaluation 2024.04.01 2025.05.27 Literature Database
Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training Authors: Shuai Zhao, Linchao Zhu, Ruijie Quan, Yi Yang | Published: 2024-03-23 | Updated: 2024-08-12 WatermarkingMembership InferenceWatermark Evaluation 2024.03.23 2025.05.27 Literature Database
Can ChatGPT Detect DeepFakes? A Study of Using Multimodal Large Language Models for Media Forensics Authors: Shan Jia, Reilin Lyu, Kangran Zhao, Yize Chen, Zhiyuan Yan, Yan Ju, Chuanbo Hu, Xin Li, Baoyuan Wu, Siwei Lyu | Published: 2024-03-21 | Updated: 2024-06-11 LLM Performance EvaluationModel Performance EvaluationWatermark Evaluation 2024.03.21 2025.05.27 Literature Database
Duwak: Dual Watermarks in Large Language Models Authors: Chaoyi Zhu, Jeroen Galjaard, Pin-Yu Chen, Lydia Y. Chen | Published: 2024-03-12 | Updated: 2024-08-08 WatermarkingToken Processing and CollectionWatermark Evaluation 2024.03.12 2025.05.27 Literature Database
Robustness bounds on the successful adversarial examples in probabilistic models: Implications from Gaussian processes Authors: Hiroaki Maeshima, Akira Otsuka | Published: 2024-03-04 | Updated: 2025-03-19 Attack MethodAdversarial ExampleWatermark Evaluation 2024.03.04 2025.05.27 Literature Database
Revisiting Differentially Private Hyper-parameter Tuning Authors: Zihang Xiang, Tianhao Wang, Chenglong Wang, Di Wang | Published: 2024-02-20 | Updated: 2024-06-04 Hyperparameter TuningPrivacy Protection MethodWatermark Evaluation 2024.02.20 2025.05.27 Literature Database
Bounding Reconstruction Attack Success of Adversaries Without Data Priors Authors: Alexander Ziller, Anneliese Riess, Kristian Schwethelm, Tamara T. Mueller, Daniel Rueckert, Georgios Kaissis | Published: 2024-02-20 Data Privacy AssessmentPrivacy Protection MethodWatermark Evaluation 2024.02.20 2025.05.27 Literature Database