Author:
Lv Haojie,Shen Shuyuan,Lin Huanjie,Yuan Yibo,Duan Delin
Publisher
Springer International Publishing
Reference28 articles.
1. Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th $$\{$$USENIX$$\}$$ Security Symposium ($$\{$$USENIX$$\}$$ Security 18), pp. 1615–1631 (2018)
2. Chen, H., Rohani, B.D., Koushanfar, F.: Deepmarks: a digital fingerprinting framework for deep neural networks. arXiv preprint arXiv:1804.03648 (2018)
3. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007)
4. Cui, L., Xu, Y.: Research on copyright protection method of material genome engineering data based on zero-watermarking. J. Big Data 2(2), 53 (2020)
5. Darvish Rouhani, B., Chen, H., Koushanfar, F.: Deepsigns: an end-to-end watermarking framework for ownership protection of deep neural networks. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 485–497 (2019)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献