1. Adi, Y., Baum, C., Cissé, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In: Enck, W., Felt, A.P. (eds.) 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, 15–17 August 2018, pp. 1615–1631. USENIX Association (2018)
2. Fan, L., Ng, K.W., Chan, C.S., Yang, Q.: DeepIPR: deep neural network intellectual property protection with passports. IEEE Trans. Pattern Anal. Mach. Intell. 44, 6122–6139 (2021)
3. Fan, L., Ng, K., Chan, C.S.: Digital passport: a novel technological strategy for intellectual property protection of convolutional neural networks. CoRR abs/1905.04368 (2019)
4. Han, S., Pool, J., Tran, J., Dally, W.J.: Learning both weights and connections for efficient neural networks. In: Proceedings of the 28th International Conference on Neural Information Processing Systems - Volume 1, pp. 1135–1143. NIPS 2015, MIT Press, Cambridge, MA, USA, December 10–12 (2015)
5. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, 27–30 June 2016. pp. 770–778. IEEE Computer Society (2016)