Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196550
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Intellectual Property of Deep Neural Networks with Watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
514
1
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 417 publications
(518 citation statements)
references
References 27 publications
2
514
1
1
Order By: Relevance
“…Figure 3 shows examples of key samples created from CIFAR-10 dataset. Figure 3 (a) are two examples of original images; Figure 3 (b)-(h) are key samples generated by methods proposed in [1,10,23,31]. Figure 3 (j) are two key samples generated by our blind-watermark based IPP framework.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Figure 3 shows examples of key samples created from CIFAR-10 dataset. Figure 3 (a) are two examples of original images; Figure 3 (b)-(h) are key samples generated by methods proposed in [1,10,23,31]. Figure 3 (j) are two key samples generated by our blind-watermark based IPP framework.…”
Section: Resultsmentioning
confidence: 99%
“…They selected a pair of random images and random labels as the watermark, which is also called key samples. Zhang et al [31] proposed a similar watermarking method while they employed other multiple types of watermarks. Adi et al [1] chosen a set of abstract images with pre-defined labels as a watermark.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…As attacks against watermark, Uchida et al [18] introduced model modification, which attempts to remove watermark from the model by modifying the parameters of the neural network using fine-tuning or pruning [7]. Similar attack methods have been considered in [12,14,20,21]. They experimentally show that verification of watermark works successfully even when the unauthorized service provider attempts to invalidate the verification by fine-tuning or pruning of the model.…”
Section: Related Workmentioning
confidence: 99%