Attacks in adversarial machine learning: A systematic survey from the life-cycle perspective

B Wu, Z Zhu, L Liu, Q Liu, Z He, S Lyu - arxiv preprint arxiv:2302.09457, 2023 - arxiv.org
Adversarial machine learning (AML) studies the adversarial phenomenon of machine
learning, which may make inconsistent or unexpected predictions with humans. Some …

[PDF][PDF] 人工智能模型水印研究进展

吴汉舟, 张杰, **越, 殷赵霞, 张新鹏, 田晖… - **图象图形 …, 2023 - researchgate.net
以神经网络为代表的人工智能技术在计算机视觉, 模式识别和自然语言处理等诸多应用领域取得
了巨大的成功, 包括谷歌, 微软在内的许多科技公司都将人工智能模型部署在商业产品中 …

Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation

AT Ngo, CS Heng, N Chattopadhyay… - arxiv preprint arxiv …, 2025 - arxiv.org
Deep Neural Networks (DNNs) have gained considerable traction in recent years due to the
unparalleled results they gathered. However, the cost behind training such sophisticated …

A Robust Information Hiding Scheme Using Third Decomposition Layer of Wavelet Against Universal Attacks

E Elbasi - 2022 IEEE World AI IoT Congress (AIIoT), 2022 - ieeexplore.ieee.org
Watermarking is one of the most common data hiding techniques for multimedia elements.
Broadcasting, copy control, copyright protection and authentication are the most frequently …

Authenticating Edge Neural Network through Hardware Security Modules and Quantum-Safe Key Management

SK Vembu, A Chattopadhyay… - 2024 37th International …, 2024 - ieeexplore.ieee.org
In the past decade, the usage and need for Deep Neural Networks (DNNs) have drastically
risen across numerous application domains. In order to train these DNNs, a vast amount of …

TextBack: Watermarking Text Classifiers using Backdooring

N Chattopadhyay, R Kataria… - 2022 25th Euromicro …, 2022 - ieeexplore.ieee.org
Creating high performance neural networks is ex-pensive, incurring costs that can be
attributed to data collection and curation, neural architecture search and training on dedi …