透かし評価

Chain of trust: Unraveling references among Common Criteria certified products

Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas | Published: 2024-04-22 | Updated: 2024-08-19
依存関係リスク評価
評価手法
透かし評価

Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion

Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21
メンバーシップ推論
透かしの耐久性
透かし評価

Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks

Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03
ウォーターマーキング
物理層セキュリティ
透かし評価

Can Biases in ImageNet Models Explain Generalization?

Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01
バイアス
モデル性能評価
透かし評価

Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training

Authors: Shuai Zhao, Linchao Zhu, Ruijie Quan, Yi Yang | Published: 2024-03-23 | Updated: 2024-08-12
ウォーターマーキング
メンバーシップ推論
透かし評価

Can ChatGPT Detect DeepFakes? A Study of Using Multimodal Large Language Models for Media Forensics

Authors: Shan Jia, Reilin Lyu, Kangran Zhao, Yize Chen, Zhiyuan Yan, Yan Ju, Chuanbo Hu, Xin Li, Baoyuan Wu, Siwei Lyu | Published: 2024-03-21 | Updated: 2024-06-11
LLM性能評価
モデル性能評価
透かし評価

Duwak: Dual Watermarks in Large Language Models

Authors: Chaoyi Zhu, Jeroen Galjaard, Pin-Yu Chen, Lydia Y. Chen | Published: 2024-03-12 | Updated: 2024-08-08
ウォーターマーキング
トークンの処理と収集
透かし評価

Robustness bounds on the successful adversarial examples in probabilistic models: Implications from Gaussian processes

Authors: Hiroaki Maeshima, Akira Otsuka | Published: 2024-03-04 | Updated: 2025-03-19
攻撃手法
敵対的サンプル
透かし評価

Revisiting Differentially Private Hyper-parameter Tuning

Authors: Zihang Xiang, Tianhao Wang, Chenglong Wang, Di Wang | Published: 2024-02-20 | Updated: 2024-06-04
ハイパーパラメータ調整
プライバシー保護手法
透かし評価

Bounding Reconstruction Attack Success of Adversaries Without Data Priors

Authors: Alexander Ziller, Anneliese Riess, Kristian Schwethelm, Tamara T. Mueller, Daniel Rueckert, Georgios Kaissis | Published: 2024-02-20
データプライバシー評価
プライバシー保護手法
透かし評価