ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.04633
  4. Cited By
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks
  by Backdooring
v1v2v3 (latest)

Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring

13 February 2018
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
ArXiv (abs)PDFHTML

Papers citing "Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"

50 / 370 papers shown
Title
Watermarking LLM-Generated Datasets in Downstream Tasks
Watermarking LLM-Generated Datasets in Downstream Tasks
Y. Liu
Tianshuo Cong
Michael Backes
Zheng Li
Yang Zhang
WaLM
47
0
0
16 Jun 2025
Watermarking Quantum Neural Networks Based on Sample Grouped and Paired Training
Watermarking Quantum Neural Networks Based on Sample Grouped and Paired Training
Limengnan Zhou
Hanzhou Wu
12
0
0
15 Jun 2025
TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
Xiaoxing Mo
Y. Cheng
Nan Sun
L. Zhang
Wei Luo
Shang Gao
AAML
103
0
0
12 Jun 2025
CHIP: Chameleon Hash-based Irreversible Passport for Robust Deep Model Ownership Verification and Active Usage Control
CHIP: Chameleon Hash-based Irreversible Passport for Robust Deep Model Ownership Verification and Active Usage Control
Chaohui Xu
Qi Cui
Chip-Hong Chang
30
0
0
30 May 2025
Ownership Verification of DNN Models Using White-Box Adversarial Attacks with Specified Probability Manipulation
Teruki Sano
Minoru Kuribayashi
Masao Sakai
Shuji Ishobe
Eisuke Koizumi
AAML
28
0
0
23 May 2025
Traceable Black-box Watermarks for Federated Learning
Traceable Black-box Watermarks for Federated Learning
Jiahao Xu
Rui Hu
Olivera Kotevska
Zikai Zhang
FedML
80
0
0
19 May 2025
MorphMark: Flexible Adaptive Watermarking for Large Language Models
MorphMark: Flexible Adaptive Watermarking for Large Language Models
Zongqi Wang
Tianle Gu
Baoyuan Wu
Yujiu Yang
WaLM
122
0
0
14 May 2025
ChainMarks: Securing DNN Watermark with Cryptographic Chain
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
88
0
0
08 May 2025
RAP-SM: Robust Adversarial Prompt via Shadow Models for Copyright Verification of Large Language Models
RAP-SM: Robust Adversarial Prompt via Shadow Models for Copyright Verification of Large Language Models
Zhenhua Xu
Zhebo Wang
Maike Li
Wenpeng Xing
Chunqiang Hu
Chen Zhi
Meng Han
AAML
101
0
0
08 May 2025
Towards the Resistance of Neural Network Watermarking to Fine-tuning
Towards the Resistance of Neural Network Watermarking to Fine-tuning
Ling Tang
YueFeng Chen
Hui Xue
Quanshi Zhang
69
0
0
02 May 2025
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models
Yujin Huang
Zhi Zhang
Qingchuan Zhao
Lizhen Qu
Chunyang Chen
70
0
0
31 Mar 2025
Hiding Images in Diffusion Models by Editing Learned Score Functions
Hiding Images in Diffusion Models by Editing Learned Score Functions
Haoyu Chen
Yunqiao Yang
Nan Zhong
Kede Ma
DiffM
135
0
0
24 Mar 2025
CEFW: A Comprehensive Evaluation Framework for Watermark in Large Language Models
CEFW: A Comprehensive Evaluation Framework for Watermark in Large Language Models
Shuhao Zhang
B. Cheng
Jiale Han
Yuli Chen
Zhixuan Wu
Changbao Li
Pingli Gu
WaLM
128
0
0
24 Mar 2025
Jailbreaking the Non-Transferable Barrier via Test-Time Data Disguising
Jailbreaking the Non-Transferable Barrier via Test-Time Data Disguising
Yongli Xiang
Ziming Hong
Lina Yao
Dadong Wang
Tongliang Liu
AAML
97
1
0
21 Mar 2025
Security and Real-time FPGA integration for Learned Image Compression
Alaa Mazouz
Carl De Sousa Tria
Sumanta Chaudhuri
Attilio Fiandrotti
Marco Cagnanzzo
Mihai P. Mitrea
Enzo Tartaglione
74
1
0
06 Mar 2025
Decoder Gradient Shield: Provable and High-Fidelity Prevention of Gradient-Based Box-Free Watermark Removal
Decoder Gradient Shield: Provable and High-Fidelity Prevention of Gradient-Based Box-Free Watermark Removal
Haonan An
Guang Hua
Zhengru Fang
Guowen Xu
Susanto Rahardja
Yuguang Fang
AAML
139
0
0
28 Feb 2025
Ten Challenging Problems in Federated Foundation Models
Ten Challenging Problems in Federated Foundation Models
Tao Fan
Hanlin Gu
Xuemei Cao
Chee Seng Chan
Qian Chen
...
Yu Zhang
Xiaojin Zhang
Zhenzhe Zheng
Lixin Fan
Qiang Yang
FedML
178
8
0
14 Feb 2025
Protecting Intellectual Property of EEG-based Neural Networks with Watermarking
Protecting Intellectual Property of EEG-based Neural Networks with Watermarking
Ahmed Abdelaziz
Ahmed Fathi
Ahmed Fares
123
0
0
09 Feb 2025
Online Gradient Boosting Decision Tree: In-Place Updates for Efficient Adding/Deleting Data
Online Gradient Boosting Decision Tree: In-Place Updates for Efficient Adding/Deleting Data
Huawei Lin
Jun Woo Chung
Yingjie Lao
Weijie Zhao
77
0
0
03 Feb 2025
FIT-Print: Towards False-claim-resistant Model Ownership Verification via Targeted Fingerprint
FIT-Print: Towards False-claim-resistant Model Ownership Verification via Targeted Fingerprint
Shuo Shao
Haozhe Zhu
Hongwei Yao
Yiming Li
Tianwei Zhang
Zhan Qin
Kui Ren
AAML
480
0
0
26 Jan 2025
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Yixiao Xu
Binxing Fang
Rui Wang
Yinghai Zhou
S. Ji
Yuan Liu
Mohan Li
AAMLMIACV
150
0
0
16 Jan 2025
HuRef: HUman-REadable Fingerprint for Large Language Models
HuRef: HUman-REadable Fingerprint for Large Language Models
Boyi Zeng
Cheng Zhou
Yuncong Hu
Yi Xu
Chenghu Zhou
Xiang Wang
Yu Yu
Zhouhan Lin
139
12
0
08 Jan 2025
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Anh Tu Ngo
Chuan Song Heng
Nandish Chattopadhyay
Anupam Chattopadhyay
AAML
464
1
0
06 Jan 2025
A Game Between the Defender and the Attacker for Trigger-based Black-box Model Watermarking
Chaoyue Huang
Hanzhou Wu
58
0
0
03 Jan 2025
Sample Correlation for Fingerprinting Deep Face Recognition
Sample Correlation for Fingerprinting Deep Face Recognition
Jiyang Guan
Jian Liang
Yanbo Wang
Ran He
AAML
154
0
0
31 Dec 2024
BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks
BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks
Yi Hao Puah
Anh Tu Ngo
Nandish Chattopadhyay
Anupam Chattopadhyay
AAML
85
0
0
14 Dec 2024
Towards Data Governance of Frontier AI Models
Towards Data Governance of Frontier AI Models
Jason Hausenloy
Duncan McClements
Madhavendra Thakur
127
2
0
05 Dec 2024
Bounding-box Watermarking: Defense against Model Extraction Attacks on Object Detectors
Bounding-box Watermarking: Defense against Model Extraction Attacks on Object Detectors
Satoru Koda
I. Morikawa
AAML
137
0
0
20 Nov 2024
SoK: On the Role and Future of AIGC Watermarking in the Era of Gen-AI
Kui Ren
Ziqi Yang
Li Lu
Enchao Gong
Yiming Li
Jie Wan
Xiaodi Zhao
Xianheng Feng
Shuo Shao
204
5
0
18 Nov 2024
A Survey on Adversarial Machine Learning for Code Data: Realistic
  Threats, Countermeasures, and Interpretations
A Survey on Adversarial Machine Learning for Code Data: Realistic Threats, Countermeasures, and Interpretations
Yulong Yang
Haoran Fan
Chenhao Lin
Qian Li
Zhengyu Zhao
Chao Shen
Xiaohong Guan
AAML
78
0
0
12 Nov 2024
Oblivious Defense in ML Models: Backdoor Removal without Detection
Oblivious Defense in ML Models: Backdoor Removal without Detection
S. Goldwasser
Jonathan Shafer
Neekon Vafa
Vinod Vaikuntanathan
AAML
47
3
0
05 Nov 2024
DeepCore: Simple Fingerprint Construction for Differentiating Homologous
  and Piracy Models
DeepCore: Simple Fingerprint Construction for Differentiating Homologous and Piracy Models
Haifeng Sun
Lan Zhang
Xiang-Yang Li
97
0
0
01 Nov 2024
Embedding Watermarks in Diffusion Process for Model Intellectual
  Property Protection
Embedding Watermarks in Diffusion Process for Model Intellectual Property Protection
Jijia Yang
Sen Peng
Xiaohua Jia
WIGM
103
0
0
29 Oct 2024
Fingerprints of Super Resolution Networks
Fingerprints of Super Resolution Networks
Jeremy Vonderfecht
Feng Liu
73
1
0
29 Oct 2024
FedGMark: Certifiably Robust Watermarking for Federated Graph Learning
FedGMark: Certifiably Robust Watermarking for Federated Graph Learning
Yuxin Yang
Qiang Li
Yuan Hong
Binghui Wang
AAMLFedML
54
2
0
23 Oct 2024
NSmark: Null Space Based Black-box Watermarking Defense Framework for Language Models
NSmark: Null Space Based Black-box Watermarking Defense Framework for Language Models
Haodong Zhao
Jinming Hu
Peixuan Li
Fangqi Li
Jinrui Sha
Peixuan Chen
Zhuosheng Zhang
Gongshen Liu
Gongshen Liu
AAML
50
0
0
16 Oct 2024
Data Taggants: Dataset Ownership Verification via Harmless Targeted Data
  Poisoning
Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning
Wassim Bouaziz
El-Mahdi El-Mhamdi
Nicolas Usunier
TDIAAML
81
4
0
09 Oct 2024
Watermarking Decision Tree Ensembles
Watermarking Decision Tree Ensembles
Stefano Calzavara
Lorenzo Cazzaro
Donald Gera
S. Orlando
WaLM
42
0
0
06 Oct 2024
Ward: Provable RAG Dataset Inference via LLM Watermarks
Ward: Provable RAG Dataset Inference via LLM Watermarks
Nikola Jovanović
Robin Staab
Maximilian Baader
Martin Vechev
466
5
0
04 Oct 2024
IDEA: An Inverse Domain Expert Adaptation Based Active DNN IP Protection Method
IDEA: An Inverse Domain Expert Adaptation Based Active DNN IP Protection Method
Chaohui Xu
Qi Cui
Jinxin Dong
Weiyang He
Chip-Hong Chang
AAML
94
2
0
29 Sep 2024
Trigger-Based Fragile Model Watermarking for Image Transformation
  Networks
Trigger-Based Fragile Model Watermarking for Image Transformation Networks
Preston K. Robinette
Dung T. Nguyen
Samuel Sasaki
Taylor T. Johnson
WIGM
54
0
0
28 Sep 2024
Proactive Schemes: A Survey of Adversarial Attacks for Social Good
Proactive Schemes: A Survey of Adversarial Attacks for Social Good
Vishal Asnani
Xi Yin
Xiaoming Liu
AAML
143
1
0
24 Sep 2024
Training Data Attribution: Was Your Model Secretly Trained On Data
  Created By Mine?
Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Likun Zhang
Hao Wu
Lefei Zhang
Fengyuan Xu
Jin Cao
Fenghua Li
Ben Niu
TDI
51
1
0
24 Sep 2024
On the Weaknesses of Backdoor-based Model Watermarking: An
  Information-theoretic Perspective
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
82
0
0
10 Sep 2024
WaterMAS: Sharpness-Aware Maximization for Neural Network Watermarking
WaterMAS: Sharpness-Aware Maximization for Neural Network Watermarking
Carl De Sousa Trias
Mihai P. Mitrea
Attilio Fiandrotti
Marco Cagnazzo
Sumanta Chaudhuri
Enzo Tartaglione
AAML
63
1
0
05 Sep 2024
NoiseAttack: An Evasive Sample-Specific Multi-Targeted Backdoor Attack
  Through White Gaussian Noise
NoiseAttack: An Evasive Sample-Specific Multi-Targeted Backdoor Attack Through White Gaussian Noise
Abdullah Arafat Miah
Kaan Icer
Resit Sendag
Yu Bi
AAMLDiffM
73
1
0
03 Sep 2024
Say No to Freeloader: Protecting Intellectual Property of Your Deep
  Model
Say No to Freeloader: Protecting Intellectual Property of Your Deep Model
Lianyu Wang
Ming Wang
Huazhu Fu
Daoqiang Zhang
86
3
0
23 Aug 2024
Revocable Backdoor for Deep Model Trading
Revocable Backdoor for Deep Model Trading
Yiran Xu
Nan Zhong
Zhenxing Qian
Xinpeng Zhang
AAML
79
0
0
01 Aug 2024
Safe-SD: Safe and Traceable Stable Diffusion with Text Prompt Trigger
  for Invisible Generative Watermarking
Safe-SD: Safe and Traceable Stable Diffusion with Text Prompt Trigger for Invisible Generative Watermarking
Zhiyuan Ma
Guoli Jia
Biqing Qi
Bowen Zhou
WIGM
109
13
0
18 Jul 2024
Watermarking Recommender Systems
Watermarking Recommender Systems
Sixiao Zhang
Cheng Long
Wei Yuan
Hongxu Chen
Hongzhi Yin
AAML
67
0
0
17 Jul 2024
12345678
Next