Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2310.14942
Cited By
Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand
9 October 2023
Junfeng Guo
Yiming Li
Lixu Wang
Shu-Tao Xia
Heng-Chiao Huang
Cong Liu
Boheng Li
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand"
38 / 38 papers shown
Title
Towards Dataset Copyright Evasion Attack against Personalized Text-to-Image Diffusion Models
Kuofeng Gao
Yufei Zhu
Yiming Li
Jiawang Bai
Yong-Liang Yang
Z. Li
Shu-Tao Xia
34
0
0
05 May 2025
Cert-SSB: Toward Certified Sample-Specific Backdoor Defense
Ting Qiao
Y. Wang
Xing Liu
Sixing Wu
Jianbing Li
Yiming Li
AAML
SILM
64
0
0
30 Apr 2025
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage
W. Zhang
Ju Jia
Xiaojun Jia
Yihao Huang
X. Li
Cong Wu
Lina Wang
AAML
33
0
0
15 Apr 2025
Instance-Level Data-Use Auditing of Visual ML Models
Zonghao Huang
Neil Zhenqiang Gong
Michael K. Reiter
MLAU
57
0
0
28 Mar 2025
Targeted Data Poisoning for Black-Box Audio Datasets Ownership Verification
Wassim Bouaziz
El-Mahdi El-Mhamdi
Nicolas Usunier
41
0
0
13 Mar 2025
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
Yiming Li
Kaiying Yan
Shuo Shao
Tongqing Zhai
Shu-Tao Xia
Z. Qin
D. Tao
AAML
77
0
0
02 Mar 2025
Split Adaptation for Pre-trained Vision Transformers
Lixu Wang
Bingqi Shang
Y. Li
Payal Mohapatra
Wei Dong
Xiao-Xu Wang
Qi Zhu
ViT
43
0
0
01 Mar 2025
REFINE: Inversion-Free Backdoor Defense via Model Reprogramming
Y. Chen
Shuo Shao
Enhao Huang
Yiming Li
Pin-Yu Chen
Z. Qin
Kui Ren
AAML
36
3
0
22 Feb 2025
SoK: On the Role and Future of AIGC Watermarking in the Era of Gen-AI
Kui Ren
Ziqi Yang
Li Lu
Jian Liu
Yiming Li
Jie Wan
Xiaodi Zhao
Xianheng Feng
Shuo Shao
96
2
0
18 Nov 2024
SoK: Dataset Copyright Auditing in Machine Learning Systems
L. Du
Xuanru Zhou
M. Chen
Chusong Zhang
Zhou Su
Peng Cheng
Jiming Chen
Zhikun Zhang
MLAU
15
2
0
22 Oct 2024
Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Boheng Li
Yanhao Wei
Yankai Fu
Z. Wang
Yiming Li
Jie Zhang
Run Wang
Tianwei Zhang
DiffM
AAML
21
9
0
14 Oct 2024
Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning
Wassim Bouaziz
El-Mahdi El-Mhamdi
Nicolas Usunier
TDI
AAML
22
1
0
09 Oct 2024
Ward: Provable RAG Dataset Inference via LLM Watermarks
Nikola Jovanović
Robin Staab
Maximilian Baader
Martin Vechev
62
1
0
04 Oct 2024
IDEA: An Inverse Domain Expert Adaptation Based Active DNN IP Protection Method
Chaohui Xu
Qi Cui
Jinxin Dong
Weiyang He
Chip-Hong Chang
AAML
22
2
0
29 Sep 2024
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
38
0
0
10 Sep 2024
ModelLock: Locking Your Model With a Spell
Yifeng Gao
Yuhua Sun
Xingjun Ma
Zuxuan Wu
Yu-Gang Jiang
VLM
40
1
0
25 May 2024
How to Trace Latent Generative Model Generated Images without Artificial Watermark?
Zhenting Wang
Vikash Sehwag
Chen Chen
Lingjuan Lyu
Dimitris N. Metaxas
Shiqing Ma
WIGM
36
5
0
22 May 2024
IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency
Linshan Hou
Ruili Feng
Zhongyun Hua
Wei Luo
Leo Yu Zhang
Yiming Li
AAML
32
19
0
16 May 2024
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Shuo Shao
Yiming Li
Hongwei Yao
Yiling He
Zhan Qin
Kui Ren
21
14
0
08 May 2024
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
Kaiyi Pang
Tao Qi
Chuhan Wu
Minhao Bai
Minghu Jiang
Yongfeng Huang
AAML
WaLM
68
2
0
03 May 2024
Uncertain Boundaries: Multidisciplinary Approaches to Copyright Issues in Generative AI
Jocelyn Dzuong
Zichong Wang
Wenbin Zhang
19
9
0
31 Mar 2024
Not Just Change the Labels, Learn the Features: Watermarking Deep Neural Networks with Multi-View Data
Yuxuan Li
S. K. Maharana
Yunhui Guo
AAML
29
0
0
15 Mar 2024
Medical Unlearnable Examples: Securing Medical Data from Unauthorized Training via Sparsity-Aware Local Masking
Weixiang Sun
Yixin Liu
Zhiling Yan
Kaidi Xu
Lichao Sun
AAML
32
3
0
15 Mar 2024
Semantic Feature Learning for Universal Unsupervised Cross-Domain Retrieval
Lixu Wang
Xinyu Du
Qi Zhu
26
0
0
08 Mar 2024
Federated Learning with New Knowledge: Fundamentals, Advances, and Futures
Lixu Wang
Yang Zhao
Jiahua Dong
Ating Yin
Qinbin Li
Xiao Wang
Dusit Niyato
Qi Zhu
FedML
74
2
0
03 Feb 2024
The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline
Haonan Wang
Qianli Shen
Yao Tong
Yang Zhang
Kenji Kawaguchi
37
22
0
07 Jan 2024
Federated Continual Novel Class Learning
Lixu Wang
Chenxi Liu
Junfeng Guo
Jiahua Dong
Xiao Wang
Heng-Chiao Huang
Qi Zhu
CLL
FedML
27
2
0
21 Dec 2023
Defenses in Adversarial Machine Learning: A Survey
Baoyuan Wu
Shaokui Wei
Mingli Zhu
Meixi Zheng
Zihao Zhu
Mingda Zhang
Hongrui Chen
Danni Yuan
Li Liu
Qingshan Liu
AAML
27
14
0
13 Dec 2023
Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise
Yixin Liu
Kaidi Xu
Xun Chen
Lichao Sun
19
7
0
22 Nov 2023
Trustworthy Large Models in Vision: A Survey
Ziyan Guo
Li Xu
Jun Liu
MU
56
0
0
16 Nov 2023
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification
Hongwei Yao
Jian Lou
Kui Ren
Zhan Qin
AAML
VLM
18
25
0
05 Aug 2023
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Stefanos Koffas
Yiming Li
AAML
21
28
0
17 Jul 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
30
8
0
14 Jun 2023
Backdoor Attack with Sparse and Invisible Trigger
Yinghua Gao
Yiming Li
Xueluan Gong
Zhifeng Li
Shutao Xia
Qianqian Wang
AAML
13
19
0
11 May 2023
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
18
1
0
08 Feb 2023
M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models
Linshan Hou
Zhongyun Hua
Yuhong Li
Yifeng Zheng
Leo Yu Zhang
AAML
13
2
0
03 Nov 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
34
53
0
31 Jan 2022
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
Yisen Wang
MIACV
136
189
0
13 Jan 2021
1