Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding

Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding

IEEE Symposium on Security and Privacy via YouTube Direct link

Our envisioned scenario

2 of 13

2 of 13

Our envisioned scenario

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Our envisioned scenario
  3. 3 Our model
  4. 4 Background models
  5. 5 Experimental setup
  6. 6 Training
  7. 7 Evaluation
  8. 8 Verification
  9. 9 Qualitative examples
  10. 10 Robustness
  11. 11 Basic Attacks
  12. 12 Advanced Attacks
  13. 13 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.