Updated on 2025.01.22
Digital Watermarking
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-17 | Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks | Yixiao Xu et.al. | 2501.09328v2 | link |
2025-01-15 | Watermarking in Diffusion Model: Gaussian Shading with Exact Diffusion Inversion via Coupled Transformations (EDICT) | Krishna Panthi et.al. | 2501.08604v1 | null |
2024-12-31 | SAT-LDM: Provably Generalizable Image Watermarking for Latent Diffusion Models with Self-Augmented Training | Lu Zhang et.al. | 2501.00463v1 | null |
2024-12-22 | RoboSignature: Robust Signature and Watermarking on Network Attacks | Aryaman Shaan et.al. | 2412.19834v1 | link |
2024-12-21 | Inflation of 2D boundary ghosts and digital watermarking | Imants Svalbe et.al. | 2412.16789v1 | null |
2024-12-17 | Invisible Watermarks: Attacks and Robustness | Dongjun Hwang et.al. | 2412.12511v1 | link |
2024-12-13 | SuperMark: Robust and Training-free Image Watermarking via Diffusion-based Super-Resolution | Runyi Hu et.al. | 2412.10049v1 | null |
2024-12-12 | Video Seal: Open and Efficient Video Watermarking | Pierre Fernandez et.al. | 2412.09492v1 | link |
2025-01-06 | LVMark: Robust Watermark for latent video diffusion models | MinHyuk Jang et.al. | 2412.09122v2 | null |
2024-12-10 | StyleMark: A Robust Watermarking Method for Art Style Images Against Black-Box Arbitrary Style Transfer | Yunming Zhang et.al. | 2412.07129v1 | null |
Diffusion Models
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-17 | DiffStereo: High-Frequency Aware Diffusion Model for Stereo Image Restoration | Huiyun Cao et.al. | 2501.10325v1 | null |
2025-01-20 | DiffVSR: Enhancing Real-World Video Super-Resolution with Diffusion Models for Advanced Visual Quality and Temporal Consistency | Xiaohui Li et.al. | 2501.10110v2 | null |
2025-01-17 | Conditional Latent Diffusion-Based Speech Enhancement Via Dual Context Learning | Shengkui Zhao et.al. | 2501.10052v1 | null |
2025-01-17 | DiffuEraser: A Diffusion Model for Video Inpainting | Xiaowen Li et.al. | 2501.10018v1 | null |
2025-01-17 | Enhancing Crash Frequency Modeling Based on Augmented Multi-Type Data by Hybrid VAE-Diffusion-Based Generative Neural Networks | Junlan Chen et.al. | 2501.10017v1 | null |
2025-01-17 | Physics-informed DeepCT: Sinogram Wavelet Decomposition Meets Masked Diffusion | Zekun Zhou et.al. | 2501.09935v1 | null |
2025-01-16 | Geometry-Preserving Encoder/Decoder in Latent Generative Models | Wonjun Lee et.al. | 2501.09876v1 | null |
2025-01-16 | CrossModalityDiffusion: Multi-Modal Novel View Synthesis with Unified Intermediate Representation | Alex Berian et.al. | 2501.09838v1 | null |
2025-01-16 | PIXELS: Progressive Image Xemplar-based Editing with Latent Surgery | Shristi Das Biswas et.al. | 2501.09826v1 | link |
2025-01-16 | Lossy Compression with Pretrained Diffusion Models | Jeremy Vonderfecht et.al. | 2501.09815v1 | link |
AI Generated Content
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-15 | Generative Medical Image Anonymization Based on Latent Code Projection and Optimization | Huiyu Li et.al. | 2501.09114v1 | link |
2025-01-15 | Few-Shot Learner Generalizes Across AI-Generated Image Detection | Shiyu Wu et.al. | 2501.08763v1 | null |
2025-01-15 | StereoGen: High-quality Stereo Image Generation from a Single Image | Xianqi Wang et.al. | 2501.08654v1 | null |
2025-01-15 | Yuan: Yielding Unblemished Aesthetics Through A Unified Network for Visual Imperfections Removal in Generated Images | Zhenyu Yu et.al. | 2501.08505v1 | link |
2025-01-15 | RoHan: Robust Hand Detection in Operation Room | Roi Papo et.al. | 2501.08115v2 | link |
2025-01-10 | The CIELO Project: The Chemo-dynamical properties of gaLaxies and the cosmic web | Patricia Tissera et.al. | 2501.05978v1 | null |
2025-01-10 | HFMF: Hierarchical Fusion Meets Multi-Stream Models for Deepfake Detection | Anant Mehta et.al. | 2501.05631v1 | link |
2025-01-08 | DRIVINGVQA: Analyzing Visual Chain-of-Thought Reasoning of Vision Language Models in Real-World Scenarios with Driving Theory Tests | Charles Corbière et.al. | 2501.04671v1 | null |
2025-01-06 | License Plate Images Generation with Diffusion Models | Mariia Shpir et.al. | 2501.03374v1 | null |
2025-01-06 | Personalized Fashion Recommendation with Image Attributes and Aesthetics Assessment | Chongxian Chen et.al. | 2501.03085v1 | null |
Image Security
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-17 | Advancing Image Security with Quantum Key Distribution and Multi-Layer Chaotic Encryption for Quantum Resilient Transmission | Tasmin Karim et.al. | 2501.09895v1 | null |
2025-01-16 | iFADIT: Invertible Face Anonymization via Disentangled Identity Transform | Lin Yuan et.al. | 2501.04390v2 | null |
2025-01-03 | SafeAug: Safety-Critical Driving Data Augmentation from Naturalistic Datasets | Zhaobin Mo et.al. | 2501.02143v1 | null |
2024-12-08 | Anti-Reference: Universal and Immediate Defense Against Reference-Based Generation | Yiren Song et.al. | 2412.05980v1 | link |
2024-12-05 | EditScout: Locating Forged Regions from Diffusion-based Edited Images with Multimodal LLM | Quang Nguyen et.al. | 2412.03809v1 | null |
2024-12-04 | Is JPEG AI going to change image forensics? | Edoardo Daniele Cannas et.al. | 2412.03261v1 | null |
2024-12-01 | DIVD: Deblurring with Improved Video Diffusion Model | Haoyang Long et.al. | 2412.00773v1 | null |
2024-11-22 | Omni-IML: Towards Unified Image Manipulation Localization | Chenfan Qu et.al. | 2411.14823v1 | null |
2024-10-19 | SLIC: Secure Learned Image Codec through Compressed Domain Watermarking to Defend Image Manipulation | Chen-Hsiu Huang et.al. | 2410.15075v1 | null |
2024-10-09 | Large-scale self-assembled nanophotonic scintillators for X-ray imaging | Louis Martin-Monier et.al. | 2410.07141v1 | null |
Deep Watermarking
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-06 | Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation | Anh Tu Ngo et.al. | 2501.02704v1 | null |
2024-12-02 | OmniGuard: Hybrid Manipulation Localization via Augmented Versatile Deep Image Watermarking | Xuanyu Zhang et.al. | 2412.01615v1 | null |
2024-11-20 | Bounding-box Watermarking: Defense against Model Extraction Attacks on Object Detectors | Satoru Koda et.al. | 2411.13047v1 | null |
2024-09-29 | IDEAW: Robust Neural Audio Watermarking with Invertible Dual-Embedding | Pengcheng Li et.al. | 2409.19627v1 | null |
2024-09-16 | FreeMark: A Non-Invasive White-Box Watermarking for Deep Neural Networks | Yuzhang Chen et.al. | 2409.09996v1 | null |
2024-07-26 | SWIFT: Semantic Watermarking for Image Forgery Thwarting | Gautier Evennou et.al. | 2407.18995v1 | link |
2024-07-18 | Not Just Change the Labels, Learn the Features: Watermarking Deep Neural Networks with Multi-View Data | Yuxuan Li et.al. | 2403.10663v2 | link |
2024-03-06 | DeepEclipse: How to Break White-Box DNN-Watermarking Schemes | Alessandro Pegoraro et.al. | 2403.03590v1 | null |
2023-12-10 | FedReverse: Multiparty Reversible Deep Neural Network Watermarking | Junlong Mao et.al. | 2312.05738v1 | null |
2023-10-25 | ClearMark: Intuitive and Robust Model Watermarking via Transposed Model Training | Torsten Krauß et.al. | 2310.16453v1 | null |
Generative AI Security
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-09 | Analyzing Memorization in Large Language Models through the Lens of Model Attribution | Tarun Ram Menta et.al. | 2501.05078v1 | link |
2024-12-16 | A LoRA is Worth a Thousand Pictures | Chenxi Liu et.al. | 2412.12048v1 | null |
2024-12-08 | Cloud Platforms for Developing Generative AI Solutions: A Scoping Review of Tools and Services | Dhavalkumar Patel et.al. | 2412.06044v1 | null |
2024-12-08 | DREAM: Domain-agnostic Reverse Engineering Attributes of Black-box Model | Rongqing Li et.al. | 2412.05842v1 | null |
2024-12-02 | Reject Threshold Adaptation for Open-Set Model Attribution of Deepfake Audio | Xinrui Yan et.al. | 2412.01425v1 | null |
2024-11-27 | Relaxing Constraints on Dark Matter Annihilation Near the Supermassive Black Hole in M87 | Mehrdad Phoroutan-Mehr et.al. | 2411.18751v1 | null |
2024-11-21 | Single-Model Attribution for Spoofed Speech via Vocoder Fingerprints in an Open-World Setting | Matías Pizarro et.al. | 2411.14013v1 | null |
2024-10-23 | LEIA discovery of the longest-lasting and most energetic stellar X-ray flare ever detected | Xuan Mao et.al. | 2410.17999v1 | null |
2024-10-17 | Advancing Large Language Model Attribution through Self-Improving | Lei Huang et.al. | 2410.13298v1 | null |
2024-08-27 | Interactive dense pixel visualizations for time series and model attribution explanations | Udo Schlegel et.al. | 2408.15073v1 | null |
Watermarking in Generative Models
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-06 | LVMark: Robust Watermark for latent video diffusion models | MinHyuk Jang et.al. | 2412.09122v2 | null |
2024-12-12 | CLUE-MARK: Watermarking Diffusion Models using CLWE | Kareem Shehata et.al. | 2411.11434v3 | null |
2024-07-17 | GROOT: Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis | Weizhi Liu et.al. | 2407.10471v2 | null |
2024-05-06 | Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models | Zijin Yang et.al. | 2404.04956v3 | link |
2024-07-23 | Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models | Hanlin Zhang et.al. | 2311.04378v4 | link |
2023-11-29 | Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process | Sen Peng et.al. | 2306.03436v2 | link |
2023-05-21 | Watermarking Diffusion Model | Yugeng Liu et.al. | 2305.12502v1 | null |
2023-05-21 | Generative Model Watermarking Suppressing High-Frequency Artifacts | Li Zhang et.al. | 2305.12391v1 | null |
2023-04-04 | Can AI Put Gamma-Ray Astrophysicists Out of a Job? | Samuel T. Spencer et.al. | 2303.17853v2 | null |
2023-10-15 | A Recipe for Watermarking Diffusion Models | Yunqing Zhao et.al. | 2303.10137v2 | link |
Model Robustness
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-17 | CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers | Matan Ben-Tov et.al. | 2501.10013v1 | null |
2025-01-16 | Unified Face Matching and Physical-Digital Spoofing Attack Detection | Arun Kunwar et.al. | 2501.09635v1 | null |
2025-01-16 | Double Visual Defense: Adversarial Pre-training and Instruction Tuning for Improving Vision-Language Model Robustness | Zeyu Wang et.al. | 2501.09446v1 | null |
2025-01-14 | I Can Find You in Seconds! Leveraging Large Language Models for Code Authorship Attribution | Soohyeon Choi et.al. | 2501.08165v1 | null |
2025-01-14 | Optimizing Speech Multi-View Feature Fusion through Conditional Computation | Weiqiao Shan et.al. | 2501.08057v1 | link |
2025-01-14 | An Adaptive Orthogonal Convolution Scheme for Efficient and Flexible CNN Architectures | Thibaut Boissin et.al. | 2501.07930v1 | link |
2025-01-13 | A Survey of Early Exit Deep Neural Networks in NLP | Divya Jyoti Bajpai et.al. | 2501.07670v1 | null |
2025-01-11 | Synthetic Feature Augmentation Improves Generalization Performance of Language Models | Ashok Choudhary et.al. | 2501.06434v1 | null |
2025-01-10 | Effective faking of verbal deception detection with target-aligned adversarial attacks | Bennett Kleinberg et.al. | 2501.05962v1 | null |
2025-01-09 | Uncertainty-aware Knowledge Tracing | Weihua Cheng et.al. | 2501.05415v1 | link |
AI Security
Publish Date | Title | Authors | Code | |
---|---|---|---|---|
2025-01-08 | Rethinking Byzantine Robustness in Federated Recommendation from Sparse Aggregation Perspective | Zhongjian Zhang et.al. | 2501.03301v2 | link |
2024-12-29 | On Adversarial Robustness of Language Models in Transfer Learning | Bohdan Turbal et.al. | 2501.00066v1 | null |
2024-12-19 | Position: A taxonomy for reporting and describing AI security incidents | Lukas Bieringer et.al. | 2412.14855v1 | null |
2024-12-16 | Deep Learning Model Security: Threats and Defenses | Tianyang Wang et.al. | 2412.08969v2 | null |
2024-12-08 | Cloud Platforms for Developing Generative AI Solutions: A Scoping Review of Tools and Services | Dhavalkumar Patel et.al. | 2412.06044v1 | null |
2024-12-03 | Sustainable Self-evolution Adversarial Training | Wenxuan Wang et.al. | 2412.02270v1 | null |
2024-11-29 | Quantized Delta Weight Is Safety Keeper | Yule Liu et.al. | 2411.19530v1 | null |
2024-11-12 | RedCode: Risky Code Execution and Generation Benchmark for Code Agents | Chengquan Guo et.al. | 2411.07781v1 | link |
2024-11-13 | Target-driven Attack for Large Language Models | Chong Zhang et.al. | 2411.07268v2 | null |
2024-11-09 | A Sharded Blockchain-Based Secure Federated Learning Framework for LEO Satellite Networks | Wenbo Wu et.al. | 2411.06137v1 | null |