2024
DOI: 10.1109/tdsc.2022.3222972
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(24 citation statements)
references
References 30 publications
0
24
0
Order By: Relevance
“…We conduct experiments on four datasets: CIFAR10, CIFAR100, GTSRB and ImageNet ILSVRC-2012. These chosen datasets are standard image sets for classification training, widely used in computer vision studies [44], [45] and previous works [30], [17], [46]. To simplify the process, we randomly select a subset consisting of 400 classes with 480,000 images for training (1200 images per class) and 20,000 images for testing (50 images per class).…”
Section: ) Datasets and Models Settingsmentioning
confidence: 99%
See 3 more Smart Citations
“…We conduct experiments on four datasets: CIFAR10, CIFAR100, GTSRB and ImageNet ILSVRC-2012. These chosen datasets are standard image sets for classification training, widely used in computer vision studies [44], [45] and previous works [30], [17], [46]. To simplify the process, we randomly select a subset consisting of 400 classes with 480,000 images for training (1200 images per class) and 20,000 images for testing (50 images per class).…”
Section: ) Datasets and Models Settingsmentioning
confidence: 99%
“…Besides, our proposed protection scheme also excels in a few emerging active protection methods [30], [17], [16], [46], [44], [7], [45], [47], [3], [27] in the following aspects: a) Other active protection methods achieve access control mechanisms by changing the neural network structure [17], [16], [44], modifying neuronal functions [7], [45], and encrypting weights with extra verification credentials irrelevant to queried samples [47], [3], [27]. These implementations are complicated and inconvenient due to extra structure modifications and computational encrypting overhead.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, such a surgical pipeline increases the difficulty and complexity of backdoor erasing tasks, but only alleviates the aforementioned problems. What's more, these staged methods are easily compromised by newlydesigned attacks with either trigger that is harder to be detected and recovered [21,22], or composite trigger that contains multiple parts [27,36,38,48].…”
Section: Introductionmentioning
confidence: 99%