Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1802.04633
Cited By
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
13 February 2018
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"
50 / 145 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
48
0
0
08 May 2025
RAP-SM: Robust Adversarial Prompt via Shadow Models for Copyright Verification of Large Language Models
Zhenhua Xu
Zhebo Wang
Maike Li
Wenpeng Xing
Chunqiang Hu
Chen Zhi
Meng Han
AAML
36
0
0
08 May 2025
Towards the Resistance of Neural Network Watermarking to Fine-tuning
Ling Tang
YueFeng Chen
Hui Xue
Quanshi Zhang
40
0
0
02 May 2025
Security and Real-time FPGA integration for Learned Image Compression
Alaa Mazouz
Carl De Sousa Tria
Sumanta Chaudhuri
Attilio Fiandrotti
Marco Cagnanzzo
Mihai P. Mitrea
Enzo Tartaglione
43
1
0
06 Mar 2025
Ten Challenging Problems in Federated Foundation Models
Tao Fan
Hanlin Gu
Xuemei Cao
Chee Seng Chan
Qian Chen
...
Yuanyuan Zhang
Xiaojin Zhang
Zhenzhe Zheng
Lixin Fan
Qiang Yang
FedML
89
4
0
14 Feb 2025
FIT-Print: Towards False-claim-resistant Model Ownership Verification via Targeted Fingerprint
Shuo Shao
Haozhe Zhu
Hongwei Yao
Yiming Li
Tianwei Zhang
Zhanyue Qin
Kui Ren
224
0
0
28 Jan 2025
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Yixiao Xu
Binxing Fang
Rui Wang
Yinghai Zhou
S. Ji
Yuan Liu
Mohan Li
Zhihong Tian
MIACV
AAML
73
0
0
20 Jan 2025
Persistence of Backdoor-based Watermarks for Neural Networks: A Comprehensive Evaluation
Anh Tu Ngo
Chuan Song Heng
Nandish Chattopadhyay
Anupam Chattopadhyay
AAML
222
0
0
06 Jan 2025
Watermarking Decision Tree Ensembles
Stefano Calzavara
Lorenzo Cazzaro
Donald Gera
S. Orlando
WaLM
35
0
0
06 Oct 2024
Ward: Provable RAG Dataset Inference via LLM Watermarks
Nikola Jovanović
Robin Staab
Maximilian Baader
Martin Vechev
199
1
0
04 Oct 2024
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
40
0
0
10 Sep 2024
NoiseAttack: An Evasive Sample-Specific Multi-Targeted Backdoor Attack Through White Gaussian Noise
Abdullah Arafat Miah
Kaan Icer
Resit Sendag
Yu Bi
AAML
DiffM
38
1
0
03 Sep 2024
Protecting Deep Learning Model Copyrights with Adversarial Example-Free Reuse Detection
Xiaokun Luan
Xiyue Zhang
Jingyi Wang
Meng Sun
AAML
28
0
0
04 Jul 2024
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking
A. Abuadbba
Nicholas Rhodes
Kristen Moore
Bushra Sabir
Shuo Wang
Yansong Gao
AAML
37
2
0
01 Jul 2024
Neural Lineage
Runpeng Yu
Xinchao Wang
40
4
0
17 Jun 2024
Can't Hide Behind the API: Stealing Black-Box Commercial Embedding Models
Manveer Singh Tamber
Jasper Xian
Jimmy Lin
MLAU
SILM
202
0
0
13 Jun 2024
GENIE: Watermarking Graph Neural Networks for Link Prediction
Venkata Sai Pranav Bachina
Ankit Gangwal
Aaryan Ajay Sharma
Charu Sharma
50
1
0
07 Jun 2024
ModelLock: Locking Your Model With a Spell
Yifeng Gao
Yuhua Sun
Xingjun Ma
Zuxuan Wu
Yu-Gang Jiang
VLM
50
1
0
25 May 2024
Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks
Hamed Poursiami
Ihsen Alouani
Maryam Parsa
42
1
0
07 May 2024
Approximate Nullspace Augmented Finetuning for Robust Vision Transformers
Haoyang Liu
Aditya Singh
Yijiang Li
Haohan Wang
AAML
ViT
39
1
0
15 Mar 2024
Adversarial Sparse Teacher: Defense Against Distillation-Based Model Stealing Attacks Using Adversarial Examples
Eda Yilmaz
H. Keles
AAML
24
2
0
08 Mar 2024
Performance-lossless Black-box Model Watermarking
Na Zhao
Kejiang Chen
Weiming Zhang
Neng H. Yu
46
1
0
11 Dec 2023
SoK: Unintended Interactions among Machine Learning Defenses and Risks
Vasisht Duddu
S. Szyller
Nadarajah Asokan
AAML
49
2
0
07 Dec 2023
Hiding Functions within Functions: Steganography by Implicit Neural Representations
Jia-Wei Liu
Peng Luo
Yan Ke
Dang Qian
Zhang Minqing
Mu Dejun
GAN
45
4
0
07 Dec 2023
Watermarking for Neural Radiation Fields by Invertible Neural Network
Wenquan Sun
Jia-Wei Liu
Weina Dong
Lifeng Chen
Ke Niu
23
1
0
05 Dec 2023
A Survey on Vulnerability of Federated Learning: A Learning Algorithm Perspective
Xianghua Xie
Chen Hu
Hanchi Ren
Jingjing Deng
FedML
AAML
53
19
0
27 Nov 2023
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models
Mingfu Xue
Leo Yu Zhang
Yushu Zhang
Weiqiang Liu
AAML
AI4CE
20
2
0
15 Oct 2023
Unified High-binding Watermark for Unconditional Image Generation Models
Ruinan Ma
Yu-an Tan
Shangbo Wu
Tian Chen
Yajie Wang
Yuan-zhang Li
AAML
DiffM
WIGM
36
1
0
14 Oct 2023
Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Jan Dubiñski
Stanislaw Pawlak
Franziska Boenisch
Tomasz Trzciñski
Adam Dziedzic
AAML
36
3
0
12 Oct 2023
Defending Our Privacy With Backdoors
Dominik Hintersdorf
Lukas Struppek
Daniel Neider
Kristian Kersting
SILM
AAML
31
2
0
12 Oct 2023
StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via Secrets Embeder and Extractor
Xingdong Ren
Tianxing Zhang
Hanzhou Wu
Xinpeng Zhang
Yinggui Wang
Guangling Sun
LLMSV
32
0
0
05 Oct 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Zi-Shun Huang
Boheng Li
Yan Cai
Run Wang
Shangwei Guo
Liming Fang
Jing Chen
Lina Wang
40
11
0
29 Jul 2023
Beating Backdoor Attack at Its Own Game
Min Liu
Alberto L. Sangiovanni-Vincentelli
Xiangyu Yue
AAML
65
11
0
28 Jul 2023
Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems
Debopam Sanyal
Jui-Tse Hung
Manavi Agrawal
Prahlad Jasti
Shahab Nikkhoo
S. Jha
Tianhao Wang
Sibin Mohan
Alexey Tumanov
51
0
0
03 Jul 2023
Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning
Shengfang Zhai
Yinpeng Dong
Qingni Shen
Shih-Chieh Pu
Yuejian Fang
Hang Su
35
72
0
07 May 2023
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
Isabell Lederer
Rudolf Mayer
Andreas Rauber
29
19
0
22 Apr 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
40
9
0
17 Apr 2023
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
Nils Lukas
Florian Kerschbaum
WIGM
29
22
0
14 Apr 2023
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Yiming Chen
Jinyu Tian
Xiangyu Chen
Jiantao Zhou
AAML
36
10
0
21 Mar 2023
Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Ruixiang Tang
Qizhang Feng
Ninghao Liu
Fan Yang
Xia Hu
28
36
0
20 Mar 2023
A Recipe for Watermarking Diffusion Models
Yunqing Zhao
Tianyu Pang
Chao Du
Xiao Yang
Ngai-man Cheung
Min Lin
WIGM
30
115
0
17 Mar 2023
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
AAML
22
20
0
27 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
46
21
0
19 Feb 2023
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
28
1
0
08 Feb 2023
Revisiting Personalized Federated Learning: Robustness Against Backdoor Attacks
Zeyu Qin
Liuyi Yao
Daoyuan Chen
Yaliang Li
Bolin Ding
Minhao Cheng
FedML
38
26
0
03 Feb 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
29
4
0
18 Jan 2023
Mixer: DNN Watermarking using Image Mixup
Kassem Kallas
Teddy Furon
WIGM
20
3
0
06 Dec 2022
Federated Learning Attacks and Defenses: A Survey
Yao Chen
Yijie Gui
Hong Lin
Wensheng Gan
Yongdong Wu
FedML
44
29
0
27 Nov 2022
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Shuo Shao
Wenyuan Yang
Hanlin Gu
Zhan Qin
Lixin Fan
Qiang Yang
Kui Ren
FedML
29
29
0
14 Nov 2022
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Wenyuan Yang
Shuo Shao
Yue Yang
Xiyao Liu
Ximeng Liu
Zhihua Xia
Gerald Schaefer
Hui Fang
FedML
14
21
0
14 Nov 2022
1
2
3
Next