DNN IP Protection Method

Masked Language Model Based Textual Adversarial Example Detection

Authors: Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang | Published: 2023-04-18 | Updated: 2024-01-28
DNN IP Protection Method
Text Generation Method
Generative Adversarial Network

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators

Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14
DNN IP Protection Method
Watermarking
Backdoor Attack

Gradient-based Uncertainty Attribution for Explainable Bayesian Deep Learning

Authors: Hanjing Wang, Dhiraj Joshi, Shiqiang Wang, Qiang Ji | Published: 2023-04-10
DNN IP Protection Method
Uncertainty Map
Self-Attention Mechanism

Reinforcement Learning-Based Black-Box Model Inversion Attacks

Authors: Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim | Published: 2023-04-10
DNN IP Protection Method
Privacy Technique
Challenges of Generative Models

AI Model Disgorgement: Methods and Choices

Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07
DNN IP Protection Method
Watermarking
Data Generation

A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference

Authors: Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra | Published: 2023-03-31 | Updated: 2024-04-25
DNN IP Protection Method
Attack Detection
Adaptive Adversarial Training

Targeted Adversarial Attacks on Wind Power Forecasts

Authors: René Heinrich, Christoph Scholz, Stephan Vogt, Malte Lehna | Published: 2023-03-29 | Updated: 2023-08-17
DNN IP Protection Method
Attack Pattern Extraction
Climate Data Collection

Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense

Authors: Kalpesh Krishna, Yixiao Song, Marzena Karpinska, John Wieting, Mohit Iyyer | Published: 2023-03-23 | Updated: 2023-10-18
DNN IP Protection Method
Prompt Injection
Machine Learning Technology

The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11
DNN IP Protection Method
Poisoning
Deep Learning Method

On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space

Authors: Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu | Published: 2023-02-23
DNN IP Protection Method
Watermarking
Model Performance Evaluation