透かし設計

Watermarking Needs Input Repetition Masking

Authors: David Khachaturov, Robert Mullins, Ilia Shumailov, Sumanth Dathathri | Published: 2025-04-16
LLM性能評価
プロンプトの検証
透かし設計

zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing

Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16
プライバシー保護プロトコル
性能評価手法
透かし設計

Support is All You Need for Certified VAE Training

Authors: Changming Xu, Debangshu Banerjee, Deepak Vasisht, Gagandeep Singh | Published: 2025-04-16
学習の改善
敵対的攻撃
透かし設計

Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs

Authors: Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen | Published: 2025-04-08
効率的証明システム
安全な算術計算
透かし設計

Detecting LLM-Written Peer Reviews

Authors: Vishisht Rao, Aounon Kumar, Himabindu Lakkaraju, Nihar B. Shah | Published: 2025-03-20
プロンプトインジェクション
生成AI向け電子透かし
透かし設計

SoK: Decentralized AI (DeAI)

Authors: Zhipeng Wang, Rui Sun, Elizabeth Lui, Vatsal Shah, Xihan Xiong, Jiahao Sun, Davide Crapis, William Knottenbelt | Published: 2024-11-26 | Updated: 2025-04-16
ブロックチェーン統合
分散学習
透かし設計

Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference

Authors: Ruying Bao, Sihang Liang, Qingcan Wang | Published: 2018-05-21 | Updated: 2018-09-29
モデルの頑健性保証
敵対的攻撃検出
透かし設計

Adversarial Frontier Stitching for Remote Neural Network Watermarking

Authors: Erwan Le Merrer, Patrick Perez, Gilles Trédan | Published: 2017-11-06 | Updated: 2019-08-07
敵対的サンプル
敵対的学習
透かし設計