SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency. (arXiv:2302.03251v1 [cs.CR])
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries embed a hidden backdoor trigger during the training process for malicious prediction manipulation. These attacks pose great threats to…
Protecting Language Generation Models via Invisible Watermarking. (arXiv:2302.03162v1 [cs.CR])
Language generation models have been an increasingly powerful enabler for many applications. Many such models offer free or affordable API access, which makes them potentially vulnerable to model extraction attacks…
Membership Inference Attacks against Diffusion Models. (arXiv:2302.03262v1 [cs.CR])
Diffusion models have attracted attention in recent years as innovative generative models. In this paper, we investigate whether a diffusion model is resistant to a membership inference attack, which evaluates…
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency. (arXiv:2302.03251v1 [cs.CR])
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries embed a hidden backdoor trigger during the training process for malicious prediction manipulation. These attacks pose great threats to…
Membership Inference Attacks against Diffusion Models. (arXiv:2302.03262v1 [cs.CR])
Diffusion models have attracted attention in recent years as innovative generative models. In this paper, we investigate whether a diffusion model is resistant to a membership inference attack, which evaluates…
Membership Inference Attacks against Diffusion Models. (arXiv:2302.03262v1 [cs.CR])
Diffusion models have attracted attention in recent years as innovative generative models. In this paper, we investigate whether a diffusion model is resistant to a membership inference attack, which evaluates…
Homomorphic Hashing Based on Elliptic Curve Cryptography. (arXiv:2302.03290v1 [cs.CR])
For avoiding the exposure of plaintexts in cloud environments, some homomorphic hashing algorithms have been proposed to generate the hash value of each plaintext, and cloud environments only store the…
Homomorphic Hashing Based on Elliptic Curve Cryptography. (arXiv:2302.03290v1 [cs.CR])
For avoiding the exposure of plaintexts in cloud environments, some homomorphic hashing algorithms have been proposed to generate the hash value of each plaintext, and cloud environments only store the…
Homomorphic Hashing Based on Elliptic Curve Cryptography. (arXiv:2302.03290v1 [cs.CR])
For avoiding the exposure of plaintexts in cloud environments, some homomorphic hashing algorithms have been proposed to generate the hash value of each plaintext, and cloud environments only store the…
Homomorphic Hashing Based on Elliptic Curve Cryptography. (arXiv:2302.03290v1 [cs.CR])
For avoiding the exposure of plaintexts in cloud environments, some homomorphic hashing algorithms have been proposed to generate the hash value of each plaintext, and cloud environments only store the…