Deep Learning model integrity checking mechanism using watermarking technique

Authors: Shahinul Hoque, Farhin Farhad Riya, Yingyuan Yang, Jinyuan Sun | Published: 2023-01-29 | Updated: 2025-03-21

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

Authors: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang | Published: 2023-01-29 | Updated: 2024-03-02

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07

Alignment with human representations supports robust few-shot learning

Authors: Ilia Sucholutsky, Thomas L. Griffiths | Published: 2023-01-27 | Updated: 2023-10-29

Practical Differentially Private Hyperparameter Tuning with Subsampling

Authors: Antti Koskela, Tejas Kulkarni | Published: 2023-01-27 | Updated: 2024-02-13

DetectGPT: Zero-Shot Machine-Generated Text Detection using Probability Curvature

Authors: Eric Mitchell, Yoonho Lee, Alexander Khazatsky, Christopher D. Manning, Chelsea Finn | Published: 2023-01-26 | Updated: 2023-07-23

Beware of the Unexpected: Bimodal Taint Analysis

Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25

Motion ID: Human Authentication Approach

Authors: Aleksei Gavron, Konstantin Belev, Konstantin Kudelkin, Vladislav Shikhov, Andrey Akushevich, Alexey Fartukov, Vladimir Paramonov, Dmitry Syromolotov, Artem Makoyan | Published: 2023-01-25

A Watermark for Large Language Models

Authors: John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, Tom Goldstein | Published: 2023-01-24 | Updated: 2024-05-01

DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2023-01-23