ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2310.14942
  4. Cited By
Domain Watermark: Effective and Harmless Dataset Copyright Protection is
  Closed at Hand

Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand

9 October 2023
Junfeng Guo
Yiming Li
Lixu Wang
Shu-Tao Xia
Heng-Chiao Huang
Cong Liu
Boheng Li
ArXivPDFHTML

Papers citing "Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand"

38 / 38 papers shown
Title
Towards Dataset Copyright Evasion Attack against Personalized Text-to-Image Diffusion Models
Towards Dataset Copyright Evasion Attack against Personalized Text-to-Image Diffusion Models
Kuofeng Gao
Yufei Zhu
Yiming Li
Jiawang Bai
Yong-Liang Yang
Z. Li
Shu-Tao Xia
34
0
0
05 May 2025
Cert-SSB: Toward Certified Sample-Specific Backdoor Defense
Cert-SSB: Toward Certified Sample-Specific Backdoor Defense
Ting Qiao
Y. Wang
Xing Liu
Sixing Wu
Jianbing Li
Yiming Li
AAML
SILM
64
0
0
30 Apr 2025
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage
W. Zhang
Ju Jia
Xiaojun Jia
Yihao Huang
X. Li
Cong Wu
Lina Wang
AAML
33
0
0
15 Apr 2025
Instance-Level Data-Use Auditing of Visual ML Models
Instance-Level Data-Use Auditing of Visual ML Models
Zonghao Huang
Neil Zhenqiang Gong
Michael K. Reiter
MLAU
57
0
0
28 Mar 2025
Targeted Data Poisoning for Black-Box Audio Datasets Ownership Verification
Wassim Bouaziz
El-Mahdi El-Mhamdi
Nicolas Usunier
41
0
0
13 Mar 2025
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
Yiming Li
Kaiying Yan
Shuo Shao
Tongqing Zhai
Shu-Tao Xia
Z. Qin
D. Tao
AAML
77
0
0
02 Mar 2025
Split Adaptation for Pre-trained Vision Transformers
Lixu Wang
Bingqi Shang
Y. Li
Payal Mohapatra
Wei Dong
Xiao-Xu Wang
Qi Zhu
ViT
43
0
0
01 Mar 2025
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
Y. Chen
Shuo Shao
Enhao Huang
Yiming Li
Pin-Yu Chen
Z. Qin
Kui Ren
AAML
36
3
0
22 Feb 2025
SoK: On the Role and Future of AIGC Watermarking in the Era of Gen-AI
Kui Ren
Ziqi Yang
Li Lu
Jian Liu
Yiming Li
Jie Wan
Xiaodi Zhao
Xianheng Feng
Shuo Shao
96
2
0
18 Nov 2024
SoK: Dataset Copyright Auditing in Machine Learning Systems
SoK: Dataset Copyright Auditing in Machine Learning Systems
L. Du
Xuanru Zhou
M. Chen
Chusong Zhang
Zhou Su
Peng Cheng
Jiming Chen
Zhikun Zhang
MLAU
15
2
0
22 Oct 2024
Towards Reliable Verification of Unauthorized Data Usage in Personalized
  Text-to-Image Diffusion Models
Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Boheng Li
Yanhao Wei
Yankai Fu
Z. Wang
Yiming Li
Jie Zhang
Run Wang
Tianwei Zhang
DiffM
AAML
21
9
0
14 Oct 2024
Data Taggants: Dataset Ownership Verification via Harmless Targeted Data
  Poisoning
Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning
Wassim Bouaziz
El-Mahdi El-Mhamdi
Nicolas Usunier
TDI
AAML
22
1
0
09 Oct 2024
Ward: Provable RAG Dataset Inference via LLM Watermarks
Ward: Provable RAG Dataset Inference via LLM Watermarks
Nikola Jovanović
Robin Staab
Maximilian Baader
Martin Vechev
62
1
0
04 Oct 2024
IDEA: An Inverse Domain Expert Adaptation Based Active DNN IP Protection
  Method
IDEA: An Inverse Domain Expert Adaptation Based Active DNN IP Protection Method
Chaohui Xu
Qi Cui
Jinxin Dong
Weiyang He
Chip-Hong Chang
AAML
22
2
0
29 Sep 2024
On the Weaknesses of Backdoor-based Model Watermarking: An
  Information-theoretic Perspective
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
38
0
0
10 Sep 2024
ModelLock: Locking Your Model With a Spell
ModelLock: Locking Your Model With a Spell
Yifeng Gao
Yuhua Sun
Xingjun Ma
Zuxuan Wu
Yu-Gang Jiang
VLM
40
1
0
25 May 2024
How to Trace Latent Generative Model Generated Images without Artificial
  Watermark?
How to Trace Latent Generative Model Generated Images without Artificial Watermark?
Zhenting Wang
Vikash Sehwag
Chen Chen
Lingjuan Lyu
Dimitris N. Metaxas
Shiqing Ma
WIGM
36
5
0
22 May 2024
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling
  Consistency
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency
Linshan Hou
Ruili Feng
Zhongyun Hua
Wei Luo
Leo Yu Zhang
Yiming Li
AAML
32
19
0
16 May 2024
Explanation as a Watermark: Towards Harmless and Multi-bit Model
  Ownership Verification via Watermarking Feature Attribution
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Shuo Shao
Yiming Li
Hongwei Yao
Yiling He
Zhan Qin
Kui Ren
21
14
0
08 May 2024
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
Kaiyi Pang
Tao Qi
Chuhan Wu
Minhao Bai
Minghu Jiang
Yongfeng Huang
AAML
WaLM
68
2
0
03 May 2024
Uncertain Boundaries: Multidisciplinary Approaches to Copyright Issues
  in Generative AI
Uncertain Boundaries: Multidisciplinary Approaches to Copyright Issues in Generative AI
Jocelyn Dzuong
Zichong Wang
Wenbin Zhang
19
9
0
31 Mar 2024
Not Just Change the Labels, Learn the Features: Watermarking Deep Neural
  Networks with Multi-View Data
Not Just Change the Labels, Learn the Features: Watermarking Deep Neural Networks with Multi-View Data
Yuxuan Li
S. K. Maharana
Yunhui Guo
AAML
29
0
0
15 Mar 2024
Medical Unlearnable Examples: Securing Medical Data from Unauthorized
  Training via Sparsity-Aware Local Masking
Medical Unlearnable Examples: Securing Medical Data from Unauthorized Training via Sparsity-Aware Local Masking
Weixiang Sun
Yixin Liu
Zhiling Yan
Kaidi Xu
Lichao Sun
AAML
32
3
0
15 Mar 2024
Semantic Feature Learning for Universal Unsupervised Cross-Domain
  Retrieval
Semantic Feature Learning for Universal Unsupervised Cross-Domain Retrieval
Lixu Wang
Xinyu Du
Qi Zhu
26
0
0
08 Mar 2024
Federated Learning with New Knowledge: Fundamentals, Advances, and
  Futures
Federated Learning with New Knowledge: Fundamentals, Advances, and Futures
Lixu Wang
Yang Zhao
Jiahua Dong
Ating Yin
Qinbin Li
Xiao Wang
Dusit Niyato
Qi Zhu
FedML
74
2
0
03 Feb 2024
The Stronger the Diffusion Model, the Easier the Backdoor: Data
  Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline
The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline
Haonan Wang
Qianli Shen
Yao Tong
Yang Zhang
Kenji Kawaguchi
37
22
0
07 Jan 2024
Federated Continual Novel Class Learning
Federated Continual Novel Class Learning
Lixu Wang
Chenxi Liu
Junfeng Guo
Jiahua Dong
Xiao Wang
Heng-Chiao Huang
Qi Zhu
CLL
FedML
27
2
0
21 Dec 2023
Defenses in Adversarial Machine Learning: A Survey
Defenses in Adversarial Machine Learning: A Survey
Baoyuan Wu
Shaokui Wei
Mingli Zhu
Meixi Zheng
Zihao Zhu
Mingda Zhang
Hongrui Chen
Danni Yuan
Li Liu
Qingshan Liu
AAML
27
14
0
13 Dec 2023
Stable Unlearnable Example: Enhancing the Robustness of Unlearnable
  Examples via Stable Error-Minimizing Noise
Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise
Yixin Liu
Kaidi Xu
Xun Chen
Lichao Sun
19
7
0
22 Nov 2023
Trustworthy Large Models in Vision: A Survey
Trustworthy Large Models in Vision: A Survey
Ziyan Guo
Li Xu
Jun Liu
MU
56
0
0
16 Nov 2023
PromptCARE: Prompt Copyright Protection by Watermark Injection and
  Verification
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification
Hongwei Yao
Jian Lou
Kui Ren
Zhan Qin
AAML
VLM
18
25
0
05 Aug 2023
Towards Stealthy Backdoor Attacks against Speech Recognition via
  Elements of Sound
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Stefanos Koffas
Yiming Li
AAML
21
28
0
17 Jul 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning
  Efficiency in Backdoor Attacks
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
30
8
0
14 Jun 2023
Backdoor Attack with Sparse and Invisible Trigger
Backdoor Attack with Sparse and Invisible Trigger
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
13
19
0
11 May 2023
On Function-Coupled Watermarks for Deep Neural Networks
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
18
1
0
08 Feb 2023
M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to
  Deep Learning Models
M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models
Linshan Hou
Zhongyun Hua
Yuhong Li
Yifeng Zheng
Leo Yu Zhang
AAML
13
2
0
03 Nov 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
34
53
0
31 Jan 2022
Unlearnable Examples: Making Personal Data Unexploitable
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
Yisen Wang
MIACV
136
189
0
13 Jan 2021
1