透かし評価

Continuous Authentication Using Mouse Clickstream Data Analysis

Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23
モデル性能評価
ユーザー認証システム
透かし評価

Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples

Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20
バックドア攻撃
敵対的攻撃手法
透かし評価

What can we learn from Data Leakage and Unlearning for Law?

Authors: Jaydeep Borkar | Published: 2023-07-19
データ漏洩
メモリゼーションの測定
透かし評価

Eliminating Label Leakage in Tree-Based Vertical Federated Learning

Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22
メンバーシップ推論
ラベル推論攻撃
透かし評価

A Privacy-Preserving Federated Learning Approach for Kernel methods

Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05
MPCアルゴリズム
プライバシー保護技術
透かし評価

PassGPT: Password Modeling and (Guided) Generation with Large Language Models

Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14
LLMの応用
モデルの設計や精度
透かし評価

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02
攻撃の評価
敵対的攻撃
透かし評価

FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking

Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02
プライバシー保護技術
知的財産保護
透かし評価

DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection

Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23
データセット生成
知的財産保護
透かし評価

Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach

Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01
敵対的サンプル
敵対的攻撃
透かし評価