ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1701.04082
  4. Cited By
Embedding Watermarks into Deep Neural Networks

Embedding Watermarks into Deep Neural Networks

15 January 2017
Yusuke Uchida
Yuki Nagai
S. Sakazawa
Shiníchi Satoh
ArXivPDFHTML

Papers citing "Embedding Watermarks into Deep Neural Networks"

50 / 102 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
Towards the Resistance of Neural Network Watermarking to Fine-tuning
Towards the Resistance of Neural Network Watermarking to Fine-tuning
Ling Tang
YueFeng Chen
Hui Xue
Quanshi Zhang
40
0
0
02 May 2025
Ten Challenging Problems in Federated Foundation Models
Ten Challenging Problems in Federated Foundation Models
Tao Fan
Hanlin Gu
Xuemei Cao
Chee Seng Chan
Qian Chen
...
Y. Zhang
Xiaojin Zhang
Zhenzhe Zheng
Lixin Fan
Qiang Yang
FedML
89
4
0
14 Feb 2025
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Yixiao Xu
Binxing Fang
Rui Wang
Yinghai Zhou
S. Ji
Yuan Liu
Mohan Li
Zhihong Tian
MIACV
AAML
68
0
0
20 Jan 2025
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Anh Tu Ngo
Chuan Song Heng
Nandish Chattopadhyay
Anupam Chattopadhyay
AAML
195
0
0
06 Jan 2025
Watermarking Decision Tree Ensembles
Watermarking Decision Tree Ensembles
Stefano Calzavara
Lorenzo Cazzaro
Donald Gera
S. Orlando
WaLM
35
0
0
06 Oct 2024
Optimizing Adaptive Attacks against Watermarks for Language Models
Optimizing Adaptive Attacks against Watermarks for Language Models
Abdulrahman Diaa
Toluwani Aremu
Nils Lukas
AAML
41
2
0
03 Oct 2024
On the Weaknesses of Backdoor-based Model Watermarking: An
  Information-theoretic Perspective
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
38
0
0
10 Sep 2024
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for
  Self-contained Tracking
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking
A. Abuadbba
Nicholas Rhodes
Kristen Moore
Bushra Sabir
Shuo Wang
Yansong Gao
AAML
35
2
0
01 Jul 2024
Neural Lineage
Neural Lineage
Runpeng Yu
Xinchao Wang
38
4
0
17 Jun 2024
Evaluating Durability: Benchmark Insights into Multimodal Watermarking
Evaluating Durability: Benchmark Insights into Multimodal Watermarking
Jielin Qiu
William Jongwon Han
Xuandong Zhao
Shangbang Long
Christos Faloutsos
Lei Li
65
1
0
06 Jun 2024
ModelLock: Locking Your Model With a Spell
ModelLock: Locking Your Model With a Spell
Yifeng Gao
Yuhua Sun
Xingjun Ma
Zuxuan Wu
Yu-Gang Jiang
VLM
50
1
0
25 May 2024
Watermarking Neuromorphic Brains: Intellectual Property Protection in
  Spiking Neural Networks
Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks
Hamed Poursiami
Ihsen Alouani
Maryam Parsa
42
1
0
07 May 2024
Adversarial Sparse Teacher: Defense Against Distillation-Based Model
  Stealing Attacks Using Adversarial Examples
Adversarial Sparse Teacher: Defense Against Distillation-Based Model Stealing Attacks Using Adversarial Examples
Eda Yilmaz
H. Keles
AAML
21
2
0
08 Mar 2024
RobWE: Robust Watermark Embedding for Personalized Federated Learning
  Model Ownership Protection
RobWE: Robust Watermark Embedding for Personalized Federated Learning Model Ownership Protection
Yang Xu
Yunlin Tan
Cheng Zhang
Kai Chi
Peng Sun
Wenyuan Yang
Ju Ren
Hongbo Jiang
Yaoxue Zhang
FedML
60
3
0
29 Feb 2024
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network
  Ownership Verification
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification
Huali Ren
Anli Yan
Xiaojun Ren
Peigen Ye
Chong-zhi Gao
Zhili Zhou
Jin Li
20
0
0
25 Dec 2023
Hiding Functions within Functions: Steganography by Implicit Neural Representations
Hiding Functions within Functions: Steganography by Implicit Neural Representations
Jia-Wei Liu
Peng Luo
Yan Ke
Dang Qian
Zhang Minqing
Mu Dejun
GAN
45
4
0
07 Dec 2023
A Survey on Vulnerability of Federated Learning: A Learning Algorithm
  Perspective
A Survey on Vulnerability of Federated Learning: A Learning Algorithm Perspective
Xianghua Xie
Chen Hu
Hanchi Ren
Jingjing Deng
FedML
AAML
50
19
0
27 Nov 2023
Turn Passive to Active: A Survey on Active Intellectual Property
  Protection of Deep Learning Models
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models
Mingfu Xue
Leo Yu Zhang
Yushu Zhang
Weiqiang Liu
AAML
AI4CE
20
2
0
15 Oct 2023
Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Jan Dubiñski
Stanislaw Pawlak
Franziska Boenisch
Tomasz Trzciñski
Adam Dziedzic
AAML
29
3
0
12 Oct 2023
Adaptive White-Box Watermarking with Self-Mutual Check Parameters in
  Deep Neural Networks
Adaptive White-Box Watermarking with Self-Mutual Check Parameters in Deep Neural Networks
Zhenzhe Gao
Z. Yin
Hongjian Zhan
Heng Yin
Yue Lu
AAML
23
0
0
22 Aug 2023
A Brief Yet In-Depth Survey of Deep Learning-Based Image Watermarking
A Brief Yet In-Depth Survey of Deep Learning-Based Image Watermarking
Xin Zhong
A. Das
Fahad Alrasheedi
A. Tanvir
30
2
0
08 Aug 2023
What can Discriminator do? Towards Box-free Ownership Verification of
  Generative Adversarial Network
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Zi-Shun Huang
Boheng Li
Yan Cai
Run Wang
Shangwei Guo
Liming Fang
Jing Chen
Lina Wang
38
11
0
29 Jul 2023
Tree-Ring Watermarks: Fingerprints for Diffusion Images that are
  Invisible and Robust
Tree-Ring Watermarks: Fingerprints for Diffusion Images that are Invisible and Robust
Yuxin Wen
John Kirchenbauer
Jonas Geiping
Tom Goldstein
WIGM
57
102
0
31 May 2023
Identifying Appropriate Intellectual Property Protection Mechanisms for
  Machine Learning Models: A Systematization of Watermarking, Fingerprinting,
  Model Access, and Attacks
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
Isabell Lederer
Rudolf Mayer
Andreas Rauber
29
19
0
22 Apr 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
35
9
0
17 Apr 2023
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
Nils Lukas
Florian Kerschbaum
WIGM
29
21
0
14 Apr 2023
The Stable Signature: Rooting Watermarks in Latent Diffusion Models
The Stable Signature: Rooting Watermarks in Latent Diffusion Models
Pierre Fernandez
Guillaume Couairon
Hervé Jégou
Matthijs Douze
Teddy Furon
WIGM
29
177
0
27 Mar 2023
Effective Ambiguity Attack Against Passport-based DNN Intellectual
  Property Protection Schemes through Fully Connected Layer Substitution
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Yiming Chen
Jinyu Tian
Xiangyu Chen
Jiantao Zhou
AAML
34
10
0
21 Mar 2023
High-frequency Matters: An Overwriting Attack and defense for
  Image-processing Neural Network Watermarking
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking
Huajie Chen
Tianqing Zhu
Chi Liu
Shui Yu
Wanlei Zhou
AAML
29
3
0
17 Feb 2023
On Function-Coupled Watermarks for Deep Neural Networks
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
28
1
0
08 Feb 2023
Deep Learning model integrity checking mechanism using watermarking technique
Deep Learning model integrity checking mechanism using watermarking technique
Shahinul Hoque
Farhin Farhad Riya
Jinyuan Stella Sun
Jinyuan Sun
AAML
26
1
0
29 Jan 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based
  Systems: A Survey and Taxonomy
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
24
4
0
18 Jan 2023
Mixer: DNN Watermarking using Image Mixup
Mixer: DNN Watermarking using Image Mixup
Kassem Kallas
Teddy Furon
WIGM
12
3
0
06 Dec 2022
FedTracker: Furnishing Ownership Verification and Traceability for
  Federated Learning Model
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Shuo Shao
Wenyuan Yang
Hanlin Gu
Zhan Qin
Lixin Fan
Qiang Yang
Kui Ren
FedML
29
29
0
14 Nov 2022
Watermarking in Secure Federated Learning: A Verification Framework
  Based on Client-Side Backdooring
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Wenyuan Yang
Shuo Shao
Yue Yang
Xiyao Liu
Ximeng Liu
Zhihua Xia
Gerald Schaefer
Hui Fang
FedML
14
21
0
14 Nov 2022
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
Reda Bellafqira
Gouenou Coatrieux
24
5
0
27 Oct 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep
  Neural Networks
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
Ran He
AAML
MLAU
50
29
0
21 Oct 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural
  Networks
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
32
16
0
14 Oct 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based
  on Intrinsic Features
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features
Mingfu Xue
Xin Wang
Ying-Chang Wu
S. Ni
Yushu Zhang
Weiqiang Liu
24
2
0
14 Oct 2022
An Embarrassingly Simple Approach for Intellectual Property Rights
  Protection on Recurrent Neural Networks
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks
Zhi Qin Tan
H. P. Wong
Chee Seng Chan
25
1
0
03 Oct 2022
Generative Model Watermarking Based on Human Visual System
Generative Model Watermarking Based on Human Visual System
Li Zhang
Yong-Jin Liu
Shaoteng Liu
Tianshu Yang
Yexin Wang
Xinpeng Zhang
Han-Yan Wu
29
4
0
30 Sep 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
19
2
0
29 Sep 2022
CATER: Intellectual Property Protection on Text Generation APIs via
  Conditional Watermarks
CATER: Intellectual Property Protection on Text Generation APIs via Conditional Watermarks
Xuanli He
Qiongkai Xu
Yi Zeng
Lingjuan Lyu
Fangzhao Wu
Jiwei Li
R. Jia
WaLM
188
72
0
19 Sep 2022
An Access Control Method with Secret Key for Semantic Segmentation
  Models
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
24
0
0
28 Aug 2022
Customized Watermarking for Deep Neural Networks via Label Distribution
  Perturbation
Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation
Tzu-Yun Chien
Chih-Ya Shen
AAML
23
0
0
10 Aug 2022
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive
  Learning
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Tianxing Zhang
Hanzhou Wu
Xiaofeng Lu
Guangling Sun
AAML
27
4
0
08 Aug 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
31
21
0
12 Jul 2022
Integrity Authentication in Tree Models
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
59
5
0
30 May 2022
VeriFi: Towards Verifiable Federated Unlearning
VeriFi: Towards Verifiable Federated Unlearning
Xiangshan Gao
Xingjun Ma
Jingyi Wang
Youcheng Sun
Bo Li
S. Ji
Peng Cheng
Jiming Chen
MU
73
46
0
25 May 2022
123
Next