<?xml version="1.0" encoding="UTF-8" ?>
		<urlset
			xmlns="https://www.sitemaps.org/schemas/sitemap/0.9"
			xmlns:xhtml="https://www.w3.org/1999/xhtml"
			xmlns:mobile="https://www.google.com/schemas/sitemap-mobile/1.0"
			xmlns:news="https://www.google.com/schemas/sitemap-news/0.9"
			xmlns:image="https://www.google.com/schemas/sitemap-image/1.1"
			xmlns:video="https://www.google.com/schemas/sitemap-video/1.1"
		>
      
    <url>
      <loc>https://hackernoon.com/ai-model-forensics-the-source-of-suspicious-text-to-image-ai</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/how-to-spot-unauthorized-use-of-ai-generated-images-without-changing-the-model</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
    <url>
      <loc>https://hackernoon.com/researchers-can-now-identify-if-your-ai-stole-its-training-data</loc>
        <priority>0.8</priority>
      <changefreq>daily</changefreq>
    </url>
    
            <url>
            <loc>https://attributions.tech/about</loc>
              <priority>0.8</priority>
            <changefreq>daily</changefreq>
            </url>
            
		</urlset>