ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1711.01894
  4. Cited By
Adversarial Frontier Stitching for Remote Neural Network Watermarking

Adversarial Frontier Stitching for Remote Neural Network Watermarking

6 November 2017
Erwan Le Merrer
P. Pérez
Gilles Trédan
    MLAU
    AAML
ArXivPDFHTML

Papers citing "Adversarial Frontier Stitching for Remote Neural Network Watermarking"

50 / 64 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
48
0
0
08 May 2025
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Anh Tu Ngo
Chuan Song Heng
Nandish Chattopadhyay
Anupam Chattopadhyay
AAML
231
0
0
06 Jan 2025
On the Weaknesses of Backdoor-based Model Watermarking: An
  Information-theoretic Perspective
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
40
0
0
10 Sep 2024
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for
  Self-contained Tracking
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking
A. Abuadbba
Nicholas Rhodes
Kristen Moore
Bushra Sabir
Shuo Wang
Yansong Gao
AAML
40
2
0
01 Jul 2024
Watermarking Neuromorphic Brains: Intellectual Property Protection in
  Spiking Neural Networks
Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks
Hamed Poursiami
Ihsen Alouani
Maryam Parsa
42
1
0
07 May 2024
Approximate Nullspace Augmented Finetuning for Robust Vision Transformers
Approximate Nullspace Augmented Finetuning for Robust Vision Transformers
Haoyang Liu
Aditya Singh
Yijiang Li
Haohan Wang
AAML
ViT
48
1
0
15 Mar 2024
Performance-lossless Black-box Model Watermarking
Performance-lossless Black-box Model Watermarking
Na Zhao
Kejiang Chen
Weiming Zhang
Neng H. Yu
49
1
0
11 Dec 2023
StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via
  Secrets Embeder and Extractor
StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via Secrets Embeder and Extractor
Xingdong Ren
Tianxing Zhang
Hanzhou Wu
Xinpeng Zhang
Yinggui Wang
Guangling Sun
LLMSV
32
0
0
05 Oct 2023
What can Discriminator do? Towards Box-free Ownership Verification of
  Generative Adversarial Network
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Zi-Shun Huang
Boheng Li
Yan Cai
Run Wang
Shangwei Guo
Liming Fang
Jing Chen
Lina Wang
43
11
0
29 Jul 2023
Identifying Appropriate Intellectual Property Protection Mechanisms for
  Machine Learning Models: A Systematization of Watermarking, Fingerprinting,
  Model Access, and Attacks
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
Isabell Lederer
Rudolf Mayer
Andreas Rauber
31
19
0
22 Apr 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
40
9
0
17 Apr 2023
Effective Ambiguity Attack Against Passport-based DNN Intellectual
  Property Protection Schemes through Fully Connected Layer Substitution
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Yiming Chen
Jinyu Tian
Xiangyu Chen
Jiantao Zhou
AAML
39
10
0
21 Mar 2023
A Recipe for Watermarking Diffusion Models
A Recipe for Watermarking Diffusion Models
Yunqing Zhao
Tianyu Pang
Chao Du
Xiao Yang
Ngai-man Cheung
Min Lin
WIGM
30
115
0
17 Mar 2023
On Function-Coupled Watermarks for Deep Neural Networks
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
28
1
0
08 Feb 2023
Deep Learning model integrity checking mechanism using watermarking technique
Deep Learning model integrity checking mechanism using watermarking technique
Shahinul Hoque
Farhin Farhad Riya
Jinyuan Stella Sun
Jinyuan Sun
AAML
29
1
0
29 Jan 2023
Mixer: DNN Watermarking using Image Mixup
Mixer: DNN Watermarking using Image Mixup
Kassem Kallas
Teddy Furon
WIGM
22
3
0
06 Dec 2022
Watermarking in Secure Federated Learning: A Verification Framework
  Based on Client-Side Backdooring
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Wenyuan Yang
Shuo Shao
Yue Yang
Xiyao Liu
Ximeng Liu
Zhihua Xia
Gerald Schaefer
Hui Fang
FedML
14
21
0
14 Nov 2022
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
Reda Bellafqira
Gouenou Coatrieux
24
5
0
27 Oct 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural
  Networks
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
32
16
0
14 Oct 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based
  on Intrinsic Features
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features
Mingfu Xue
Xin Wang
Ying-Chang Wu
S. Ni
Yushu Zhang
Weiqiang Liu
27
2
0
14 Oct 2022
An Embarrassingly Simple Approach for Intellectual Property Rights
  Protection on Recurrent Neural Networks
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks
Zhi Qin Tan
H. P. Wong
Chee Seng Chan
28
1
0
03 Oct 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
25
2
0
29 Sep 2022
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive
  Learning
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Tianxing Zhang
Hanzhou Wu
Xiaofeng Lu
Guangling Sun
AAML
27
4
0
08 Aug 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
36
21
0
12 Jul 2022
ROSE: A RObust and SEcure DNN Watermarking
ROSE: A RObust and SEcure DNN Watermarking
Kassem Kallas
Teddy Furon
11
7
0
22 Jun 2022
Integrity Authentication in Tree Models
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
59
5
0
30 May 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial
  Perturbations
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
33
66
0
17 Feb 2022
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained
  Encoders
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong
Xinlei He
Yang Zhang
23
53
0
27 Jan 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
30
58
0
26 Jan 2022
FedComm: Federated Learning as a Medium for Covert Communication
FedComm: Federated Learning as a Medium for Covert Communication
Dorjan Hitaj
Giulio Pagnotta
Briland Hitaj
Fernando Perez-Cruz
L. Mancini
FedML
32
10
0
21 Jan 2022
Watermarking Pre-trained Encoders in Contrastive Learning
Watermarking Pre-trained Encoders in Contrastive Learning
Yutong Wu
Han Qiu
Tianwei Zhang
L. Jiwei
M. Qiu
33
11
0
20 Jan 2022
Protecting Intellectual Property of Language Generation APIs with
  Lexical Watermark
Protecting Intellectual Property of Language Generation APIs with Lexical Watermark
Xuanli He
Qiongkai Xu
Lingjuan Lyu
Fangzhao Wu
Chenguang Wang
WaLM
180
95
0
05 Dec 2021
Safe Distillation Box
Safe Distillation Box
Jingwen Ye
Yining Mao
Mingli Song
Xinchao Wang
Cheng Jin
Xiuming Zhang
AAML
24
13
0
05 Dec 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
26
5
0
03 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed
  With Secret Key From Unauthorized Access
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
16
5
0
01 Sep 2021
SoK: How Robust is Image Classification Deep Neural Network
  Watermarking? (Extended Version)
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)
Nils Lukas
Edward Jiang
Xinda Li
Florian Kerschbaum
AAML
36
87
0
11 Aug 2021
Structural Watermarking to Deep Neural Networks via Network Channel
  Pruning
Structural Watermarking to Deep Neural Networks via Network Channel Pruning
Xiangyu Zhao
Yinzhe Yao
Hanzhou Wu
Xinpeng Zhang
AAML
21
23
0
19 Jul 2021
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in
  Deep Neural Networks
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
Suyoung Lee
Wonho Song
Suman Jana
M. Cha
Sooel Son
AAML
27
13
0
18 Jun 2021
Detect and remove watermark in deep neural networks via generative
  adversarial networks
Detect and remove watermark in deep neural networks via generative adversarial networks
Haoqi Wang
Mingfu Xue
Shichang Sun
Yushu Zhang
Jian Wang
Weiqiang Liu
AAML
29
12
0
15 Jun 2021
Non-Transferable Learning: A New Approach for Model Ownership
  Verification and Applicability Authorization
Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization
Lixu Wang
Shichao Xu
Ruiqi Xu
Tianlin Li
Qi Zhu
AAML
19
45
0
13 Jun 2021
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Siyue Wang
Xiao Wang
Pin-Yu Chen
Pu Zhao
Xue Lin
AAML
40
2
0
14 May 2021
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation
  with Secret Key
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Maungmaung Aprilpyone
Hitoshi Kiya
18
17
0
09 Apr 2021
A survey of deep neural network watermarking techniques
A survey of deep neural network watermarking techniques
Yue Li
Hongxia Wang
Mauro Barni
34
141
0
16 Mar 2021
Deep Model Intellectual Property Protection via Deep Watermarking
Deep Model Intellectual Property Protection via Deep Watermarking
Jie Zhang
Dongdong Chen
Jing Liao
Weiming Zhang
Huamin Feng
G. Hua
Nenghai Yu
33
106
0
08 Mar 2021
ActiveGuard: An Active DNN IP Protection Technique via Adversarial
  Examples
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Mingfu Xue
Shichang Sun
Can He
Yushu Zhang
Jian Wang
Weiqiang Liu
AAML
27
7
0
02 Mar 2021
DeepiSign: Invisible Fragile Watermark to Protect the Integrityand
  Authenticity of CNN
DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
A. Abuadbba
Hyoungshick Kim
Surya Nepal
22
16
0
12 Jan 2021
Watermarking Graph Neural Networks by Random Graphs
Watermarking Graph Neural Networks by Random Graphs
Xiangyu Zhao
Hanzhou Wu
Xinpeng Zhang
21
36
0
01 Nov 2020
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal
  Attack for DNN Models
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models
Shangwei Guo
Tianwei Zhang
Han Qiu
Yi Zeng
Tao Xiang
Yang Liu
AAML
14
33
0
18 Sep 2020
Adversarial Watermarking Transformer: Towards Tracing Text Provenance
  with Data Hiding
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
Sahar Abdelnabi
Mario Fritz
WaLM
28
143
0
07 Sep 2020
Model extraction from counterfactual explanations
Model extraction from counterfactual explanations
Ulrich Aïvodji
Alexandre Bolot
Sébastien Gambs
MIACV
MLAU
33
51
0
03 Sep 2020
12
Next