Continuous Authentication Using Mouse Clickstream Data Analysis Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23 Model Performance EvaluationUser Authentication SystemWatermark Evaluation 2023.11.23 2025.05.28 Literature Database
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20 Backdoor AttackAdversarial Attack MethodsWatermark Evaluation 2023.07.20 2025.05.28 Literature Database
What can we learn from Data Leakage and Unlearning for Law? Authors: Jaydeep Borkar | Published: 2023-07-19 Data LeakageMeasurement of MemorizationWatermark Evaluation 2023.07.19 2025.05.28 Literature Database
Eliminating Label Leakage in Tree-Based Vertical Federated Learning Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22 Membership InferenceLabel Inference AttackWatermark Evaluation 2023.07.19 2025.05.28 Literature Database
A Privacy-Preserving Federated Learning Approach for Kernel methods Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05 MPC AlgorithmPrivacy Enhancing TechnologyWatermark Evaluation 2023.06.05 2025.05.28 Literature Database
PassGPT: Password Modeling and (Guided) Generation with Large Language Models Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14 LLM ApplicationModel Design and AccuracyWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02 Attack EvaluationAdversarial attackWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02 Privacy Enhancing TechnologyIntellectual Property ProtectionWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23 Dataset GenerationIntellectual Property ProtectionWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01 Adversarial ExampleAdversarial attackWatermark Evaluation 2023.06.01 2025.05.28 Literature Database