Author:
Dai Long,Mao Jiarong,Xu Liaoran,Fan Xuefeng,Zhou Xiaoyi
Funder
National Natural Science Foundation of China
Key Research and Development Project of Hainan Province
Subject
Human-Computer Interaction,Theoretical Computer Science,Software
Reference27 articles.
1. Abdelnabi, S., Fritz, M., 2021. Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding. In: 2021 IEEE Symposium on Security and Privacy (SP). pp. 121–140. http://dx.doi.org/10.1109/SP40001.2021.00083.
2. Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J., 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In: 27th {USENIX} Security Symposium ({USENIX} Security 18). pp. 1615–1631.
3. An overview of digital video watermarking;Asikuzzaman;IEEE Trans. Circuits Syst. Video Technol.,2017
4. A backdoor attack against LSTM-based text classification systems;Dai;IEEE Access,2019
5. Dai, L., Mao, J., Xu, L., Fan, X., Zhou, X., 2023. Balancing Robustness and Covertness in NLP Model Watermarking: A Multi-Task Learning Approach. In: 2023 IEEE Symposium on Computers and Communications (ISCC). pp. 1376–1382. http://dx.doi.org/10.1109/ISCC58397.2023.10218209.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献