知的財産保護

Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses

Authors: Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong | Published: 2025-08-27
モデル抽出攻撃
敵対的学習
知的財産保護

A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives

Authors: Kaixiang Zhao, Lincan Li, Kaize Ding, Neil Zhenqiang Gong, Yue Zhao, Yushun Dong | Published: 2025-08-20 | Updated: 2025-08-27
モデル抽出攻撃
知的財産保護
防御手法の統合

MiZero: The Shadowy Defender Against Text Style Infringements

Authors: Ziwei Zhang, Juan Wen, Wanli Peng, Zhengxian Wu, Yinghan Zhou, Yiming Xue | Published: 2025-03-30 | Updated: 2025-05-29
プロンプトインジェクション
知的財産保護
透かし技術

FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking

Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02
プライバシー保護技術
知的財産保護
透かし評価

DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection

Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23
データセット生成
知的財産保護
透かし評価

Understanding Programs by Exploiting (Fuzzing) Test Cases

Authors: Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, Hao Chen | Published: 2023-05-23 | Updated: 2023-06-12
コード変更分析
プログラム理解
知的財産保護

An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks

Authors: Zhi Qin Tan, Hao Shan Wong, Chee Seng Chan | Published: 2022-10-03 | Updated: 2022-10-04
DNN IP保護手法
性能評価指標
知的財産保護

Mobile authentication of copy detection patterns: how critical is to know fakes?

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05
データ生成
性能評価
知的財産保護

Dataset Inference: Ownership Resolution in Machine Learning

Authors: Pratyush Maini, Mohammad Yaghini, Nicolas Papernot | Published: 2021-04-21
データプライバシー評価
知的財産保護
統計的仮説検定

Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks

Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22
攻撃手法
知的財産保護
透かし除去技術