2022
DOI: 10.1109/tpami.2021.3088846
|View full text |Cite
|
Sign up to set email alerts
|

DeepIPR: Deep Neural Network Ownership Verification With Passports

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
81
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 56 publications
(83 citation statements)
references
References 12 publications
1
81
0
1
Order By: Relevance
“…Machine learning methods that allow ownership verifications of valuable models, especially large deep neural network models, have been successfully demonstrated by either detecting feature-based signatures embedded into models [88,89] , or verifying designated labels for backdoor samples that are injected into the models during the training stage [89,90] .…”
Section: Challengesmentioning
confidence: 99%
“…Machine learning methods that allow ownership verifications of valuable models, especially large deep neural network models, have been successfully demonstrated by either detecting feature-based signatures embedded into models [88,89] , or verifying designated labels for backdoor samples that are injected into the models during the training stage [89,90] .…”
Section: Challengesmentioning
confidence: 99%
“…We implement the baseline with a public DNN watermarking toolbox 2 . The second baseline involves the model modification by introducing the sign loss into the target model by injecting a passport layer for watermark verification [12]. Implementation Details.…”
Section: Experimental Settingmentioning
confidence: 99%
“…To conduct a comprehensive robustness evaluation, we explore the robustness of our method against transfer learning which is widely employed in the community [12]. Specifically, the model is pre-trained on the challenging dataset ImageNet.…”
Section: Evaluation On Robustnessmentioning
confidence: 99%
See 1 more Smart Citation
“…Cada organização tem sua própria propriedade intelectual e é um grande desafio para eles proteger seus dados, ou seja, pirataria de software ou injeção de código malicioso etc . Os ataques de ambiguidade visam lançar dúvidas sobre a verificação da propriedade intelectual, e representam sérias ameaças aos métodos de defesa existentes (FAN, 2021).…”
Section: Introductionunclassified