1. Uchida, Y., Nagai, Y., Sakazawa, S., & Satoh, S. (2017). Embedding watermarks into deep neural networks. In Proceedings of the ACM international conference on multimedia retrieval (pp. 269–277). New York: ACM.
2. Rouhani, B. D., Chen, H., & Koushanfar, F. (2019). Deepsigns: an end-to-end watermarking framework for ownership protection of deep neural networks. In Proceedings of the 24th international conference on architectural support for programming languages and operating systems (pp. 485–497). New York: ACM.
3. Wang, T., & Kerschbaum, F. (2021). Riga: covert and robust white-box watermarking of deep neural networks. In Proceedings of the web conference (pp. 993–1004). New York: ACM.
4. Shao, S., Yang, W., Gu, H., Qin, Z., Fan, L., Yang, Q., et al. (2022). Fedtracker: furnishing ownership verification and traceability for federated learning model. arXiv preprint. arXiv:2211.07160.
5. Adi, Y., Baum, C., Cisse, M., Pinkas, B., & Keshet, J. (2018). Turning your weakness into a strength: watermarking deep neural networks by backdooring. In Proceedings of the 27th USENIX security symposium (pp. 1615–1631). Berkeley: USENIX Association.