ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1711.01894
  4. Cited By
Adversarial Frontier Stitching for Remote Neural Network Watermarking

Adversarial Frontier Stitching for Remote Neural Network Watermarking

6 November 2017
Erwan Le Merrer
P. Pérez
Gilles Trédan
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Adversarial Frontier Stitching for Remote Neural Network Watermarking"

50 / 54 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Anh Tu Ngo
Chuan Song Heng
Nandish Chattopadhyay
Anupam Chattopadhyay
AAML
136
0
0
06 Jan 2025
On the Weaknesses of Backdoor-based Model Watermarking: An
  Information-theoretic Perspective
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
38
0
0
10 Sep 2024
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for
  Self-contained Tracking
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking
A. Abuadbba
Nicholas Rhodes
Kristen Moore
Bushra Sabir
Shuo Wang
Yansong Gao
AAML
32
2
0
01 Jul 2024
Watermarking Neuromorphic Brains: Intellectual Property Protection in
  Spiking Neural Networks
Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks
Hamed Poursiami
Ihsen Alouani
Maryam Parsa
40
1
0
07 May 2024
Approximate Nullspace Augmented Finetuning for Robust Vision Transformers
Approximate Nullspace Augmented Finetuning for Robust Vision Transformers
Haoyang Liu
Aditya Singh
Yijiang Li
Haohan Wang
AAML
ViT
36
1
0
15 Mar 2024
StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via
  Secrets Embeder and Extractor
StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via Secrets Embeder and Extractor
Xingdong Ren
Tianxing Zhang
Hanzhou Wu
Xinpeng Zhang
Yinggui Wang
Guangling Sun
LLMSV
21
0
0
05 Oct 2023
What can Discriminator do? Towards Box-free Ownership Verification of
  Generative Adversarial Network
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Zi-Shun Huang
Boheng Li
Yan Cai
Run Wang
Shangwei Guo
Liming Fang
Jing Chen
Lina Wang
35
11
0
29 Jul 2023
Identifying Appropriate Intellectual Property Protection Mechanisms for
  Machine Learning Models: A Systematization of Watermarking, Fingerprinting,
  Model Access, and Attacks
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
Isabell Lederer
Rudolf Mayer
Andreas Rauber
24
19
0
22 Apr 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
35
9
0
17 Apr 2023
Effective Ambiguity Attack Against Passport-based DNN Intellectual
  Property Protection Schemes through Fully Connected Layer Substitution
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Yiming Chen
Jinyu Tian
Xiangyu Chen
Jiantao Zhou
AAML
34
10
0
21 Mar 2023
On Function-Coupled Watermarks for Deep Neural Networks
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
23
1
0
08 Feb 2023
Deep Learning model integrity checking mechanism using watermarking technique
Deep Learning model integrity checking mechanism using watermarking technique
Shahinul Hoque
Farhin Farhad Riya
Jinyuan Stella Sun
Jinyuan Sun
AAML
24
1
0
29 Jan 2023
Watermarking in Secure Federated Learning: A Verification Framework
  Based on Client-Side Backdooring
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Wenyuan Yang
Shuo Shao
Yue Yang
Xiyao Liu
Ximeng Liu
Zhihua Xia
Gerald Schaefer
Hui Fang
FedML
14
21
0
14 Nov 2022
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
Reda Bellafqira
Gouenou Coatrieux
16
5
0
27 Oct 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural
  Networks
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
32
16
0
14 Oct 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based
  on Intrinsic Features
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features
Mingfu Xue
Xin Wang
Ying-Chang Wu
S. Ni
Yushu Zhang
Weiqiang Liu
19
2
0
14 Oct 2022
An Embarrassingly Simple Approach for Intellectual Property Rights
  Protection on Recurrent Neural Networks
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks
Zhi Qin Tan
H. P. Wong
Chee Seng Chan
12
1
0
03 Oct 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
17
2
0
29 Sep 2022
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive
  Learning
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Tianxing Zhang
Hanzhou Wu
Xiaofeng Lu
Guangling Sun
AAML
27
4
0
08 Aug 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
31
21
0
12 Jul 2022
Integrity Authentication in Tree Models
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
57
5
0
30 May 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial
  Perturbations
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
31
66
0
17 Feb 2022
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained
  Encoders
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong
Xinlei He
Yang Zhang
18
52
0
27 Jan 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
22
58
0
26 Jan 2022
FedComm: Federated Learning as a Medium for Covert Communication
FedComm: Federated Learning as a Medium for Covert Communication
Dorjan Hitaj
Giulio Pagnotta
Briland Hitaj
Fernando Perez-Cruz
L. Mancini
FedML
32
10
0
21 Jan 2022
Watermarking Pre-trained Encoders in Contrastive Learning
Watermarking Pre-trained Encoders in Contrastive Learning
Yutong Wu
Han Qiu
Tianwei Zhang
L. Jiwei
M. Qiu
23
9
0
20 Jan 2022
Protecting Intellectual Property of Language Generation APIs with
  Lexical Watermark
Protecting Intellectual Property of Language Generation APIs with Lexical Watermark
Xuanli He
Qiongkai Xu
Lingjuan Lyu
Fangzhao Wu
Chenguang Wang
WaLM
177
94
0
05 Dec 2021
Safe Distillation Box
Safe Distillation Box
Jingwen Ye
Yining Mao
Jie Song
Xinchao Wang
Cheng Jin
Xiuming Zhang
AAML
21
13
0
05 Dec 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
18
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed
  With Secret Key From Unauthorized Access
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
14
5
0
01 Sep 2021
SoK: How Robust is Image Classification Deep Neural Network
  Watermarking? (Extended Version)
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)
Nils Lukas
Edward Jiang
Xinda Li
Florian Kerschbaum
AAML
36
86
0
11 Aug 2021
Structural Watermarking to Deep Neural Networks via Network Channel
  Pruning
Structural Watermarking to Deep Neural Networks via Network Channel Pruning
Xiangyu Zhao
Yinzhe Yao
Hanzhou Wu
Xinpeng Zhang
AAML
13
23
0
19 Jul 2021
Detect and remove watermark in deep neural networks via generative
  adversarial networks
Detect and remove watermark in deep neural networks via generative adversarial networks
Haoqi Wang
Mingfu Xue
Shichang Sun
Yushu Zhang
Jian Wang
Weiqiang Liu
AAML
21
12
0
15 Jun 2021
Non-Transferable Learning: A New Approach for Model Ownership
  Verification and Applicability Authorization
Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization
Lixu Wang
Shichao Xu
Ruiqi Xu
Tianlin Li
Qi Zhu
AAML
11
45
0
13 Jun 2021
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Siyue Wang
Xiao Wang
Pin-Yu Chen
Pu Zhao
Xue Lin
AAML
30
2
0
14 May 2021
A survey of deep neural network watermarking techniques
A survey of deep neural network watermarking techniques
Yue Li
Hongxia Wang
Mauro Barni
31
140
0
16 Mar 2021
Deep Model Intellectual Property Protection via Deep Watermarking
Deep Model Intellectual Property Protection via Deep Watermarking
Jie Zhang
Dongdong Chen
Jing Liao
Weiming Zhang
Huamin Feng
G. Hua
Nenghai Yu
18
106
0
08 Mar 2021
ActiveGuard: An Active DNN IP Protection Technique via Adversarial
  Examples
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Mingfu Xue
Shichang Sun
Can He
Yushu Zhang
Jian Wang
Weiqiang Liu
AAML
19
7
0
02 Mar 2021
Watermarking Graph Neural Networks by Random Graphs
Watermarking Graph Neural Networks by Random Graphs
Xiangyu Zhao
Hanzhou Wu
Xinpeng Zhang
19
36
0
01 Nov 2020
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal
  Attack for DNN Models
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models
Shangwei Guo
Tianwei Zhang
Han Qiu
Yi Zeng
Tao Xiang
Yang Liu
AAML
14
33
0
18 Sep 2020
Adversarial Watermarking Transformer: Towards Tracing Text Provenance
  with Data Hiding
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
Sahar Abdelnabi
Mario Fritz
WaLM
18
143
0
07 Sep 2020
Model extraction from counterfactual explanations
Model extraction from counterfactual explanations
Ulrich Aïvodji
Alexandre Bolot
Sébastien Gambs
MIACV
MLAU
27
51
0
03 Sep 2020
Model Watermarking for Image Processing Networks
Model Watermarking for Image Processing Networks
Jie Zhang
Dongdong Chen
Jing Liao
Han Fang
Weiming Zhang
Wenbo Zhou
Hao Cui
Nenghai Yu
WIGM
AAML
16
130
0
25 Feb 2020
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Nils Lukas
Yuxuan Zhang
Florian Kerschbaum
MLAU
FedML
AAML
31
144
0
02 Dec 2019
REFIT: A Unified Watermark Removal Framework For Deep Learning Systems
  With Limited Data
REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data
Xinyun Chen
Wenxiao Wang
Chris Bender
Yiming Ding
R. Jia
Bo-wen Li
D. Song
AAML
19
106
0
17 Nov 2019
IPGuard: Protecting Intellectual Property of Deep Neural Networks via
  Fingerprinting the Classification Boundary
IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary
Xiaoyu Cao
Jinyuan Jia
Neil Zhenqiang Gong
11
106
0
28 Oct 2019
Effectiveness of Distillation Attack and Countermeasure on Neural
  Network Watermarking
Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking
Ziqi Yang
Hung Dang
E. Chang
AAML
19
34
0
14 Jun 2019
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking
Jiabao Guo
M. Potkonjak
AAML
WIGM
24
15
0
11 Jun 2019
Digital Passport: A Novel Technological Strategy for Intellectual
  Property Protection of Convolutional Neural Networks
Digital Passport: A Novel Technological Strategy for Intellectual Property Protection of Convolutional Neural Networks
Lixin Fan
KamWoh Ng
Chee Seng Chan
16
3
0
10 May 2019
12
Next