ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1701.04082
  4. Cited By
Embedding Watermarks into Deep Neural Networks

Embedding Watermarks into Deep Neural Networks

15 January 2017
Yusuke Uchida
Yuki Nagai
S. Sakazawa
Shiníchi Satoh
ArXivPDFHTML

Papers citing "Embedding Watermarks into Deep Neural Networks"

50 / 81 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
Towards the Resistance of Neural Network Watermarking to Fine-tuning
Towards the Resistance of Neural Network Watermarking to Fine-tuning
Ling Tang
YueFeng Chen
Hui Xue
Quanshi Zhang
30
0
0
02 May 2025
Ten Challenging Problems in Federated Foundation Models
Ten Challenging Problems in Federated Foundation Models
Tao Fan
Hanlin Gu
Xuemei Cao
Chee Seng Chan
Qian Chen
...
Y. Zhang
Xiaojin Zhang
Zhenzhe Zheng
Lixin Fan
Qiang Yang
FedML
83
4
0
14 Feb 2025
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Yixiao Xu
Binxing Fang
Rui Wang
Yinghai Zhou
S. Ji
Yuan Liu
Mohan Li
Zhihong Tian
MIACV
AAML
63
0
0
20 Jan 2025
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Anh Tu Ngo
Chuan Song Heng
Nandish Chattopadhyay
Anupam Chattopadhyay
AAML
127
0
0
06 Jan 2025
Watermarking Decision Tree Ensembles
Watermarking Decision Tree Ensembles
Stefano Calzavara
Lorenzo Cazzaro
Donald Gera
S. Orlando
WaLM
30
0
0
06 Oct 2024
On the Weaknesses of Backdoor-based Model Watermarking: An
  Information-theoretic Perspective
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
38
0
0
10 Sep 2024
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for
  Self-contained Tracking
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking
A. Abuadbba
Nicholas Rhodes
Kristen Moore
Bushra Sabir
Shuo Wang
Yansong Gao
AAML
27
2
0
01 Jul 2024
Neural Lineage
Neural Lineage
Runpeng Yu
Xinchao Wang
26
4
0
17 Jun 2024
Evaluating Durability: Benchmark Insights into Multimodal Watermarking
Evaluating Durability: Benchmark Insights into Multimodal Watermarking
Jielin Qiu
William Jongwon Han
Xuandong Zhao
Shangbang Long
Christos Faloutsos
Lei Li
57
1
0
06 Jun 2024
ModelLock: Locking Your Model With a Spell
ModelLock: Locking Your Model With a Spell
Yifeng Gao
Yuhua Sun
Xingjun Ma
Zuxuan Wu
Yu-Gang Jiang
VLM
40
1
0
25 May 2024
Watermarking Neuromorphic Brains: Intellectual Property Protection in
  Spiking Neural Networks
Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks
Hamed Poursiami
Ihsen Alouani
Maryam Parsa
29
1
0
07 May 2024
RobWE: Robust Watermark Embedding for Personalized Federated Learning
  Model Ownership Protection
RobWE: Robust Watermark Embedding for Personalized Federated Learning Model Ownership Protection
Yang Xu
Yunlin Tan
Cheng Zhang
Kai Chi
Peng Sun
Wenyuan Yang
Ju Ren
Hongbo Jiang
Yaoxue Zhang
FedML
52
2
0
29 Feb 2024
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network
  Ownership Verification
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification
Huali Ren
Anli Yan
Xiaojun Ren
Peigen Ye
Chong-zhi Gao
Zhili Zhou
Jin Li
20
0
0
25 Dec 2023
Hiding Functions within Functions: Steganography by Implicit Neural Representations
Hiding Functions within Functions: Steganography by Implicit Neural Representations
Jia-Wei Liu
Peng Luo
Yan Ke
Dang Qian
Zhang Minqing
Mu Dejun
GAN
45
4
0
07 Dec 2023
A Survey on Vulnerability of Federated Learning: A Learning Algorithm
  Perspective
A Survey on Vulnerability of Federated Learning: A Learning Algorithm Perspective
Xianghua Xie
Chen Hu
Hanchi Ren
Jingjing Deng
FedML
AAML
29
19
0
27 Nov 2023
Turn Passive to Active: A Survey on Active Intellectual Property
  Protection of Deep Learning Models
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models
Mingfu Xue
Leo Yu Zhang
Yushu Zhang
Weiqiang Liu
AAML
AI4CE
15
2
0
15 Oct 2023
Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Jan Dubiñski
Stanislaw Pawlak
Franziska Boenisch
Tomasz Trzciñski
Adam Dziedzic
AAML
29
3
0
12 Oct 2023
Adaptive White-Box Watermarking with Self-Mutual Check Parameters in
  Deep Neural Networks
Adaptive White-Box Watermarking with Self-Mutual Check Parameters in Deep Neural Networks
Zhenzhe Gao
Z. Yin
Hongjian Zhan
Heng Yin
Yue Lu
AAML
16
0
0
22 Aug 2023
A Brief Yet In-Depth Survey of Deep Learning-Based Image Watermarking
A Brief Yet In-Depth Survey of Deep Learning-Based Image Watermarking
Xin Zhong
A. Das
Fahad Alrasheedi
A. Tanvir
22
2
0
08 Aug 2023
Tree-Ring Watermarks: Fingerprints for Diffusion Images that are
  Invisible and Robust
Tree-Ring Watermarks: Fingerprints for Diffusion Images that are Invisible and Robust
Yuxin Wen
John Kirchenbauer
Jonas Geiping
Tom Goldstein
WIGM
35
99
0
31 May 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
35
9
0
17 Apr 2023
The Stable Signature: Rooting Watermarks in Latent Diffusion Models
The Stable Signature: Rooting Watermarks in Latent Diffusion Models
Pierre Fernandez
Guillaume Couairon
Hervé Jégou
Matthijs Douze
Teddy Furon
WIGM
15
176
0
27 Mar 2023
Effective Ambiguity Attack Against Passport-based DNN Intellectual
  Property Protection Schemes through Fully Connected Layer Substitution
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Yiming Chen
Jinyu Tian
Xiangyu Chen
Jiantao Zhou
AAML
29
10
0
21 Mar 2023
High-frequency Matters: An Overwriting Attack and defense for
  Image-processing Neural Network Watermarking
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking
Huajie Chen
Tianqing Zhu
Chi Liu
Shui Yu
Wanlei Zhou
AAML
21
3
0
17 Feb 2023
On Function-Coupled Watermarks for Deep Neural Networks
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
23
1
0
08 Feb 2023
Deep Learning model integrity checking mechanism using watermarking technique
Deep Learning model integrity checking mechanism using watermarking technique
Shahinul Hoque
Farhin Farhad Riya
Jinyuan Stella Sun
Jinyuan Sun
AAML
21
1
0
29 Jan 2023
FedTracker: Furnishing Ownership Verification and Traceability for
  Federated Learning Model
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Shuo Shao
Wenyuan Yang
Hanlin Gu
Zhan Qin
Lixin Fan
Qiang Yang
Kui Ren
FedML
27
27
0
14 Nov 2022
Watermarking in Secure Federated Learning: A Verification Framework
  Based on Client-Side Backdooring
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Wenyuan Yang
Shuo Shao
Yue Yang
Xiyao Liu
Ximeng Liu
Zhihua Xia
Gerald Schaefer
Hui Fang
FedML
12
21
0
14 Nov 2022
DICTION: DynamIC robusT whIte bOx watermarkiNg scheme
DICTION: DynamIC robusT whIte bOx watermarkiNg scheme
R. Bellafqira
G. Coatrieux
16
5
0
27 Oct 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep
  Neural Networks
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
R. He
AAML
MLAU
40
29
0
21 Oct 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural
  Networks
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
32
16
0
14 Oct 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based
  on Intrinsic Features
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features
Mingfu Xue
Xin Wang
Ying-Chang Wu
S. Ni
Yushu Zhang
Weiqiang Liu
16
2
0
14 Oct 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
17
2
0
29 Sep 2022
CATER: Intellectual Property Protection on Text Generation APIs via
  Conditional Watermarks
CATER: Intellectual Property Protection on Text Generation APIs via Conditional Watermarks
Xuanli He
Qiongkai Xu
Yi Zeng
Lingjuan Lyu
Fangzhao Wu
Jiwei Li
R. Jia
WaLM
183
71
0
19 Sep 2022
An Access Control Method with Secret Key for Semantic Segmentation
  Models
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
24
0
0
28 Aug 2022
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive
  Learning
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Tianxing Zhang
Hanzhou Wu
Xiaofeng Lu
Guangling Sun
AAML
21
4
0
08 Aug 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
31
21
0
12 Jul 2022
Integrity Authentication in Tree Models
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
54
5
0
30 May 2022
VeriFi: Towards Verifiable Federated Unlearning
VeriFi: Towards Verifiable Federated Unlearning
Xiangshan Gao
Xingjun Ma
Jingyi Wang
Youcheng Sun
Bo Li
S. Ji
Peng Cheng
Jiming Chen
MU
65
46
0
25 May 2022
Verifying Integrity of Deep Ensemble Models by Lossless Black-box
  Watermarking with Sensitive Samples
Verifying Integrity of Deep Ensemble Models by Lossless Black-box Watermarking with Sensitive Samples
Lina Lin
Hanzhou Wu
AAML
14
5
0
09 May 2022
Access Control of Object Detection Models Using Encrypted Feature Maps
Access Control of Object Detection Models Using Encrypted Feature Maps
Teru Nagamori
Hiroki Ito
April Pyone Maung Maung
Hitoshi Kiya
8
1
0
01 Feb 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
22
58
0
26 Jan 2022
Watermarking Pre-trained Encoders in Contrastive Learning
Watermarking Pre-trained Encoders in Contrastive Learning
Yutong Wu
Han Qiu
Tianwei Zhang
L. Jiwei
M. Qiu
23
9
0
20 Jan 2022
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
Xudong Pan
Yifan Yan
Mi Zhang
Min Yang
19
23
0
19 Jan 2022
Protect the Intellectual Property of Dataset against Unauthorized Use
Protect the Intellectual Property of Dataset against Unauthorized Use
Mingfu Xue
Yinghao Wu
Yushu Zhang
Jian Wang
Weiqiang Liu
22
4
0
16 Sep 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
15
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed
  With Secret Key From Unauthorized Access
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
14
5
0
01 Sep 2021
Regulating Ownership Verification for Deep Neural Networks: Scenarios,
  Protocols, and Prospects
Regulating Ownership Verification for Deep Neural Networks: Scenarios, Protocols, and Prospects
Fangqi Li
Shi-Lin Wang
Alan Wee-Chung Liew
18
8
0
20 Aug 2021
SoK: How Robust is Image Classification Deep Neural Network
  Watermarking? (Extended Version)
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)
Nils Lukas
Edward Jiang
Xinda Li
Florian Kerschbaum
AAML
30
86
0
11 Aug 2021
12
Next