Masked Language Model Based Textual Adversarial Example Detection Authors: Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang | Published: 2023-04-18 | Updated: 2024-01-28 DNN IP Protection MethodText Generation MethodGenerative Adversarial Network 2023.04.18 2025.05.28 Literature Database
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14 DNN IP Protection MethodWatermarkingBackdoor Attack 2023.04.12 2025.05.28 Literature Database
Gradient-based Uncertainty Attribution for Explainable Bayesian Deep Learning Authors: Hanjing Wang, Dhiraj Joshi, Shiqiang Wang, Qiang Ji | Published: 2023-04-10 DNN IP Protection MethodUncertainty MapSelf-Attention Mechanism 2023.04.10 2025.05.28 Literature Database
Reinforcement Learning-Based Black-Box Model Inversion Attacks Authors: Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim | Published: 2023-04-10 DNN IP Protection MethodPrivacy TechniqueChallenges of Generative Models 2023.04.10 2025.05.28 Literature Database
AI Model Disgorgement: Methods and Choices Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07 DNN IP Protection MethodWatermarkingData Generation 2023.04.07 2025.05.28 Literature Database
A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference Authors: Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra | Published: 2023-03-31 | Updated: 2024-04-25 DNN IP Protection MethodAttack DetectionAdaptive Adversarial Training 2023.03.31 2025.05.28 Literature Database
Targeted Adversarial Attacks on Wind Power Forecasts Authors: René Heinrich, Christoph Scholz, Stephan Vogt, Malte Lehna | Published: 2023-03-29 | Updated: 2023-08-17 DNN IP Protection MethodAttack Pattern ExtractionClimate Data Collection 2023.03.29 2025.05.28 Literature Database
Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense Authors: Kalpesh Krishna, Yixiao Song, Marzena Karpinska, John Wieting, Mohit Iyyer | Published: 2023-03-23 | Updated: 2023-10-18 DNN IP Protection MethodPrompt InjectionMachine Learning Technology 2023.03.23 2025.05.28 Literature Database
The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11 DNN IP Protection MethodPoisoningDeep Learning Method 2023.03.15 2025.05.28 Literature Database
On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space Authors: Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu | Published: 2023-02-23 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.23 2025.05.28 Literature Database