1 paper across 1 session
We introduce provable and practical watermarking approaches for data poisoning attacks.