S. Mann and M. Hilbert, “Ai4d: artificial intelligence for development,” SSRN, 2018.
I. Hepworth, K. Olive, K. Dasgupta, M. Le, M. Lodato, M. Maruseac, S. Meiklejohn, S. Chaudhuri, and T. Minkus, “Securing the ai software supply chain,” tech. rep., Technical report, Google, 2024. URL: https://research. googl e/pubs/securing..., 2024.
A. Wood and M. Walker, “Confused learning: Supply chain attacks through machine learning models,” in Black Hat Asia, Black Hat, 2024.
T. Gu, K. Liu, B. Dolan-Gavitt, and S. Garg, “Badnets: Evaluating backdooring attacks on deep neural networks,” IEEE Access, vol. 7, pp. 47230-47244, 2019.
SLSA Working Group, “SLSA: Supply chain levels for software artifacts.” https://slsa.dev, 2022. Accessed: 2024-03-01.
Z. Newman, J. S. Meyers, and S. Torres-Arias, “Sigstore: Software signing for everybody,” in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2353-2367, 2022.
M. Lucas, PGP & GPG: Email for the practical paranoid. No Starch Press, 2006.
M. Pilgrim, “Serializing python objects,” in Dive Into Python 3, pp. 205-223, Springer, 2009.
J. Zhu, Z. Wang, W. Lai, and B. Li, “SafeTensors: Preventing model backdooring through secure serialization,” in USENIX Security Symposium, pp. 3425-3442, 2023.
Devex, “Usaid unveils a new digital policy to drive the next decade.” Development News, 2024.
X. Wang et al., “Sok: Watermarking for ai-generated content,” 2024.
J. Fairoze, S. Garg, M. Wang, and S. Jha, “Publicly-detectable watermarking for language models,” arXiv preprint arXiv:2310.18491, 2024.