Showing 1 - 1 results of 1 for search '"complex verification"', query time: 0.04s Refine Results
  1. 1

    Enhancing Security of Proof-of-Learning Against Spoofing Attacks Using Feature-Based Model Watermarking by Ozgur Ural, Kenji Yoshigoe

    Published 2024-01-01
    “…This integration mitigates security risks associated with external key management and reduces computational overhead by eliminating the need for complex verification procedures. Our proposed dual-layered verification architecture embeds unique watermarks during the training phase. …”
    Get full text
    Article