Boundary unlearning: Rapid forgetting of deep networks via shifting the decision boundary

M Chen, W Gao, G Liu, K Peng… - Proceedings of the …, 2023 - openaccess.thecvf.com
The practical needs of the" right to be forgotten" and poisoned data removal call for efficient
machine unlearning techniques, which enable machine learning models to unlearn, or to …

Promptcare: Prompt copyright protection by watermark injection and verification

H Yao, J Lou, Z Qin, K Ren - 2024 IEEE Symposium on Security …, 2024 - ieeexplore.ieee.org
Large language models (LLMs) have witnessed a meteoric rise in popularity among the
general public users over the past few months, facilitating diverse downstream tasks with …

[HTML][HTML] Performance of externally validated machine learning models based on histopathology images for the diagnosis, classification, prognosis, or treatment …

R Gonzalez, P Nejat, A Saha, CJV Campbell… - Journal of Pathology …, 2024 - Elsevier
Numerous machine learning (ML) models have been developed for breast cancer using
various types of data. Successful external validation (EV) of ML models is important …

TEAR: Exploring temporal evolution of adversarial robustness for membership inference attacks against federated learning

G Liu, Z Tian, J Chen, C Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is a privacy-preserving machine learning paradigm that enables
multiple clients to train a unified model without disclosing their private data. However …

Deep intellectual property protection: A survey

Y Sun, T Liu, P Hu, Q Liao, S Fu, N Yu, D Guo… - arXiv preprint arXiv …, 2023 - arxiv.org
Deep Neural Networks (DNNs), from AlexNet to ResNet to ChatGPT, have made
revolutionary progress in recent years, and are widely used in various fields. The high …

{SoK}: All You Need to Know About {On-Device}{ML} Model Extraction-The Gap Between Research and Practice

T Nayan, Q Guo, M Al Duniawi, M Botacin… - 33rd USENIX Security …, 2024 - usenix.org
On-device ML is increasingly used in different applications. It brings convenience to offline
tasks and avoids sending user-private data through the network. On-device ML models are …

A semi-fragile reversible watermarking for authenticating 3D models in dual domains based on variable direction double modulation

F Peng, T Liao, M Long - … on Circuits and Systems for Video …, 2022 - ieeexplore.ieee.org
Aiming at reducing the large distortion of the existing reversible watermarking for three-
dimensional (3D) mesh models and meeting the needs of authentication in cloud-based …

Knowledge Representation of Training Data with Adversarial Examples Supporting Decision Boundary

Z Tian, Z Wang, AM Abdelmoniem… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deep learning (DL) has achieved tremendous success in recent years in many fields. The
success of DL typically relies on a considerable amount of training data and the expensive …

The SPATIAL architecture: Design and development experiences from gauging and monitoring the ai inference capabilities of modern applications

AR Ottun, R Marasinghe, T Elemosho… - 2024 IEEE 44th …, 2024 - ieeexplore.ieee.org
Despite its enormous economical and societal impact, lack of human-perceived control and
safety is re-defining the design and development of emerging AI-based technologies. New …

Selfish-aware and learning-aided computation offloading for edge–cloud collaboration network

P Zhao, Z Yang, Y Mu, G Zhang - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) raises the problem of selfish user devices that utilize less
computing resources than expected to execute offloading tasks or maliciously discard …