1. Adversarial watermarking transformer: Towards tracing text provenance with data hiding;Abdelnabi,2021
2. Adi, Y., Baum, C., Cisse, M., Pinkas, B., & Keshet, J. (2018). Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th USENIX security symposium (pp. 1615–1631).
3. Gamin: An adversarial approach to black-box model inversion;Aïvodji,2019
4. Deep-lock: Secure authorization for deep neural networks;Alam,2020
5. Boemer, F., Lao, Y., Cammarota, R., & Wierzynski, C. (2019). nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data. In Proceedings of the 16th ACM international conference on computing frontiers (pp. 3–13).