Pitfalls in language models for code intelligence: A taxonomy and survey

X She, Y Liu, Y Zhao, Y He, L Li… - arXiv preprint arXiv …, 2023 - arxiv.org
Modern language models (LMs) have been successfully employed in source code
generation and understanding, leading to a significant increase in research focused on …

Deep intellectual property: A survey

Y Sun, T Liu, P Hu, Q Liao, S Ji, N Yu, D Guo… - arXiv preprint arXiv …, 2023 - arxiv.org
With the widespread application in industrial manufacturing and commercial services, well-
trained deep neural networks (DNNs) are becoming increasingly valuable and crucial …

Identifying appropriate intellectual property protection mechanisms for machine learning models: A systematization of watermarking, fingerprinting, model access, and …

I Lederer, R Mayer, A Rauber - IEEE Transactions on Neural …, 2023 - ieeexplore.ieee.org
The commercial use of machine learning (ML) is spreading; at the same time, ML models
are becoming more complex and more expensive to train, which makes intellectual property …

Your Transferability Barrier is Fragile: Free-Lunch for Transferring the Non-Transferable Learning

Z Hong, L Shen, T Liu - … of the IEEE/CVF Conference on …, 2024 - openaccess.thecvf.com
Recently non-transferable learning (NTL) was proposed to restrict models' generalization
toward the target domain (s) which serves as state-of-the-art solutions for intellectual …

Sok: Pitfalls in evaluating black-box attacks

F Suya, A Suri, T Zhang, J Hong… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Numerous works study black-box attacks on image classifiers, where adversaries generate
adversarial examples against unknown target models without having access to their internal …

Expand-and-cluster: exact parameter recovery of neural networks

F Martinelli, B Simsek, J Brea, W Gerstner - arXiv preprint arXiv …, 2023 - arxiv.org
Can we recover the hidden parameters of an Artificial Neural Network (ANN) by probing its
input-output mapping? We propose a systematic method, calledExpand-and-Cluster'that …

Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape-A Survey

JC Zhao, S Bagchi, S Avestimehr, KS Chan… - arXiv preprint arXiv …, 2024 - arxiv.org
Deep learning has shown incredible potential across a vast array of tasks and
accompanying this growth has been an insatiable appetite for data. However, a large …

Model Reconstruction Using Counterfactual Explanations: Mitigating the Decision Boundary Shift

P Dissanayake, S Dutta - arXiv preprint arXiv:2405.05369, 2024 - arxiv.org
Counterfactual explanations find ways of achieving a favorable model outcome with
minimum input perturbation. However, counterfactual explanations can also be exploited to …

When Your AI Becomes a Target: AI Security Incidents and Best Practices

K Grosse, L Bieringer, TR Besold, B Biggio… - Proceedings of the AAAI …, 2024 - ojs.aaai.org
In contrast to vast academic efforts to study AI security, few real-world reports of AI security
incidents exist. Released incidents prevent a thorough investigation of the attackers' …

Desiderata for next generation of ML model serving

S Akoush, A Paleyes, A Van Looveren… - arXiv preprint arXiv …, 2022 - arxiv.org
Inference is a significant part of ML software infrastructure. Despite the variety of inference
frameworks available, the field as a whole can be considered in its early days. This position …