LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking Authors: Yeganeh Aghamohammadi, Amin Rezaei | Published: 2024-02-06 Graph Neural NetworkModel InterpretabilityWatermark Evaluation 2024.02.06 2025.05.27 Literature Database
PAC-Bayesian Adversarially Robust Generalization Bounds for Graph Neural Network Authors: Tan Sun, Junhong Lin | Published: 2024-02-06 | Updated: 2024-07-06 Graph Neural NetworkAdversarial ExampleWatermark Evaluation 2024.02.06 2025.05.27 Literature Database
Verifiable evaluations of machine learning models using zkSNARKs Authors: Tobin South, Alexander Camuto, Shrey Jain, Shayla Nguyen, Robert Mahari, Christian Paquin, Jason Morton, Alex 'Sandy' Pentland | Published: 2024-02-05 | Updated: 2024-05-22 Model Performance EvaluationWatermark EvaluationTransparency and Verification 2024.02.05 2025.05.27 Literature Database
Wasserstein Differential Privacy Authors: Chengyi Yang, Jiayin Qi, Aimin Zhou | Published: 2024-01-23 WatermarkingPrivacy Protection MethodWatermark Evaluation 2024.01.23 2025.05.27 Literature Database
The Surprising Harmfulness of Benign Overfitting for Adversarial Robustness Authors: Yifan Hao, Tong Zhang | Published: 2024-01-19 | Updated: 2024-01-25 Robustness EvaluationConvergence PropertyWatermark Evaluation 2024.01.19 2025.05.27 Literature Database
Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs Authors: Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert | Published: 2024-01-16 GPU VulnerabilityGPU VulnerabilityWatermark Evaluation 2024.01.16 2025.05.27 Literature Database
The Effect of Intrinsic Dataset Properties on Generalization: Unraveling Learning Differences Between Natural and Medical Images Authors: Nicholas Konz, Maciej A. Mazurowski | Published: 2024-01-16 | Updated: 2024-02-21 Impact of GeneralizationMedical Image AnalysisWatermark Evaluation 2024.01.16 2025.05.27 Literature Database
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models Authors: Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li | Published: 2024-01-14 Privacy Protection MethodPoisoningWatermark Evaluation 2024.01.14 2025.05.27 Literature Database
Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11 WatermarkingSecurity AnalysisWatermark Evaluation 2024.01.11 2025.05.27 Literature Database
Improving the Privacy and Practicality of Objective Perturbation for Differentially Private Linear Learners Authors: Rachel Redberg, Antti Koskela, Yu-Xiang Wang | Published: 2023-12-31 Hyperparameter TuningPrivacy Protection MethodWatermark Evaluation 2023.12.31 2025.05.27 Literature Database