{"id":"https://openalex.org/W4388092540","doi":"https://doi.org/10.48550/arxiv.2310.18491","title":"Publicly-Detectable Watermarking for Language Models","display_name":"Publicly-Detectable Watermarking for Language Models","publication_year":2023,"publication_date":"2023-10-27","ids":{"openalex":"https://openalex.org/W4388092540","doi":"https://doi.org/10.48550/arxiv.2310.18491"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2310.18491","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2310.18491","pdf_url":"https://arxiv.org/pdf/2310.18491","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2310.18491","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085822503","display_name":"Jaiden Fairoze","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fairoze, Jaiden","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009985076","display_name":"Sanjam Garg","orcid":"https://orcid.org/0000-0003-1330-0419"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Garg, Sanjam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088826068","display_name":"Somesh Jha","orcid":"https://orcid.org/0000-0001-5877-0436"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jha, Somesh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049153799","display_name":"Saeed Mahloujifar","orcid":"https://orcid.org/0000-0001-6586-8378"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mahloujifar, Saeed","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070147229","display_name":"Mohammad Mahmoody","orcid":"https://orcid.org/0000-0002-6839-4697"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mahmoody, Mohammad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100692035","display_name":"Mingyuan Wang","orcid":"https://orcid.org/0000-0001-6569-1154"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Mingyuan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085822503"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9379509091377258},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7200357913970947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6874111890792847},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6612139940261841},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6382129788398743},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6269944310188293},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5542725324630737},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5451194643974304},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4576924741268158},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.45568040013313293},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4483621120452881},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4269738793373108},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4240691065788269},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3869993984699249},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.24017193913459778},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20443415641784668},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16804885864257812},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.107989102602005},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10029923915863037},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.09943893551826477},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07888966798782349}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9379509091377258},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7200357913970947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6874111890792847},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6612139940261841},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6382129788398743},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6269944310188293},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5542725324630737},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5451194643974304},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4576924741268158},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.45568040013313293},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4483621120452881},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4269738793373108},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4240691065788269},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3869993984699249},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.24017193913459778},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20443415641784668},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16804885864257812},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.107989102602005},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10029923915863037},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09943893551826477},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07888966798782349},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2310.18491","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2310.18491","pdf_url":"https://arxiv.org/pdf/2310.18491","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550/arxiv.2310.18491","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2310.18491","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2310.18491","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2310.18491","pdf_url":"https://arxiv.org/pdf/2310.18491","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1404197429","display_name":null,"funder_award_id":"W911NF-17-1-04","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G1523888516","display_name":null,"funder_award_id":"FA9550-","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G1574964069","display_name":null,"funder_award_id":"W911NF-17-1-0405","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G1766360814","display_name":null,"funder_award_id":"FA9550-18-1-0166","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G2067847097","display_name":"SaTC: CORE: Frontier: Collaborative: End-to-End Trustworthiness of Machine-Learning Systems","funder_award_id":"1804648","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3673415204","display_name":null,"funder_award_id":"FA9550-18-1-01","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G5056048078","display_name":null,"funder_award_id":"IIS-2008559","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5485705226","display_name":null,"funder_award_id":"A9550-18-1-0166","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G5809100787","display_name":null,"funder_award_id":"FA9550","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G5921281487","display_name":null,"funder_award_id":"number","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6312673494","display_name":"Collaborative Research: RI: Small: Theoretical Foundations: TheAdvantage of Deep Learning over Traditional Shallow Learning Methods","funder_award_id":"2008559","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6487893095","display_name":null,"funder_award_id":"FA9550-18-1-016","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G6541107097","display_name":null,"funder_award_id":"W911NF-17-1-040","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7527978201","display_name":null,"funder_award_id":"FMitF-1836978","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8012778163","display_name":null,"funder_award_id":"1836978","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4388092540.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"We":[0,21,51,69],"present":[1],"a":[2,23,62],"publicly-detectable":[3],"watermarking":[4,67],"scheme":[5,72],"for":[6,64],"LMs:":[7],"the":[8,46],"detection":[9],"algorithm":[10],"contains":[11],"no":[12],"secret":[13],"information,":[14],"and":[15,33,39,73],"it":[16],"is":[17],"executable":[18],"by":[19],"anyone.":[20],"embed":[22],"publicly-verifiable":[24],"cryptographic":[25],"signature":[26],"into":[27],"LM":[28],"output":[29],"using":[30],"rejection":[31],"sampling":[32],"prove":[34],"that":[35,75],"this":[36],"produces":[37],"unforgeable":[38],"distortion-free":[40],"(i.e.,":[41],"undetectable":[42],"without":[43],"access":[44],"to":[45,56],"public":[47],"key)":[48],"text":[49],"output.":[50],"make":[52],"use":[53],"of":[54,59],"error-correction":[55],"overcome":[57],"periods":[58],"low":[60],"entropy,":[61],"barrier":[63],"all":[65],"prior":[66],"schemes.":[68],"implement":[70],"our":[71,76],"find":[74],"formal":[77],"claims":[78],"are":[79],"met":[80],"in":[81],"practice.":[82]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
