透かし評価

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02
攻撃の評価
敵対的攻撃
透かし評価

FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking

Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02
プライバシー保護技術
知的財産保護
透かし評価

DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection

Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23
データセット生成
知的財産保護
透かし評価

Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach

Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01
敵対的サンプル
敵対的攻撃
透かし評価

A Note On Interpreting Canary Exposure

Authors: Matthew Jagielski | Published: 2023-05-31 | Updated: 2023-06-02
プライバシー保護手法
メンバーシップ推論
透かし評価

Differential Privacy with Random Projections and Sign Random Projections

Authors: Ping Li, Xiaoyun Li | Published: 2023-05-22 | Updated: 2023-06-13
データプライバシー評価
プライバシー保護技術
透かし評価

Perfectly Secure Steganography Using Minimum Entropy Coupling

Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30
プライバシー手法
透かし評価
通信モデル

Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence

Authors: Carles Domingo-Enrich, Youssef Mroueh | Published: 2022-05-27
プライバシー評価
フレームワーク
透かし評価

Differentially Private AUC Computation in Vertical Federated Learning

Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang | Published: 2022-05-24
クライアントサイドコンポーネント
データ収集
透かし評価

Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency

Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09
モデル性能評価
深層学習手法
透かし評価