透かしの耐久性

Towards Code Watermarking with Dual-Channel Transformations

Authors: Borui Yang, Wei Li, Liyao Xiang, Bo Li | Published: 2023-09-02 | Updated: 2024-01-02
データ保護手法
特徴選択手法
透かしの耐久性

On the Steganographic Capacity of Selected Learning Models

Authors: Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp | Published: 2023-08-29
データ生成
機械学習手法
透かしの耐久性

ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching

Authors: M. Caner Tol, Berk Sunar | Published: 2023-08-24
LLMセキュリティ
脆弱性回避手法
透かしの耐久性

DUAW: Data-free Universal Adversarial Watermark against Stable Diffusion Customization

Authors: Xiaoyu Ye, Hao Huang, Jiaqi An, Yongtao Wang | Published: 2023-08-19
カスタマイズ手法
データ生成
透かしの耐久性

Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model

Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16
セキュリティ保証
攻撃の評価
透かしの耐久性

PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification

Authors: Hongwei Yao, Jian Lou, Kui Ren, Zhan Qin | Published: 2023-08-05 | Updated: 2023-11-28
ソフトプロンプト最適化
プロンプトインジェクション
透かしの耐久性

Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud

Authors: Pinglan Liu, Wensheng Zhang | Published: 2023-08-02
多者計算
深層学習手法
透かしの耐久性

Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks

Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03
敵対的サンプル
敵対的攻撃
透かしの耐久性

Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation

Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi | Published: 2023-08-01
医療データの透かし設定
透かしの耐久性
連合学習

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30
サイバーセキュリティ
敵対的スペクトル攻撃検出
透かしの耐久性