Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1802.04633
Cited By
v1
v2
v3 (latest)
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
13 February 2018
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"
50 / 370 papers shown
Title
FedSOV: Federated Model Secure Ownership Verification with Unforgeable Signature
Wenyuan Yang
Gongxi Zhu
Yuguo Yin
Hanlin Gu
Lixin Fan
Qiang Yang
Xiaochun Cao
FedML
63
6
0
10 May 2023
FedZKP: Federated Model Ownership Verification with Zero-knowledge Proof
Wenyuan Yang
Yuguo Yin
Gongxi Zhu
Hanlin Gu
Lixin Fan
Xiaochun Cao
Qiang Yang
FedML
78
9
0
08 May 2023
Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning
Shengfang Zhai
Yinpeng Dong
Qingni Shen
Shih-Chieh Pu
Yuejian Fang
Hang Su
73
77
0
07 May 2023
NNSplitter: An Active Defense Solution for DNN Model via Automated Weight Obfuscation
Tong Zhou
Yukui Luo
Shaolei Ren
Xiaolin Xu
AAML
94
20
0
28 Apr 2023
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
Isabell Lederer
Rudolf Mayer
Andreas Rauber
98
19
0
22 Apr 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
84
10
0
17 Apr 2023
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
Nils Lukas
Florian Kerschbaum
WIGM
102
24
0
14 Apr 2023
False Claims against Model Ownership Resolution
Jian Liu
Rui Zhang
S. Szyller
Kui Ren
Nirmal Asokan
AAML
MLAU
123
12
0
13 Apr 2023
Do Backdoors Assist Membership Inference Attacks?
Yumeki Goto
Nami Ashizawa
Toshiki Shibahara
Naoto Yanai
MIACV
61
2
0
22 Mar 2023
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Yiming Chen
Jinyu Tian
Xiangyu Chen
Jiantao Zhou
AAML
80
11
0
21 Mar 2023
Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Ruixiang Tang
Qizhang Feng
Ninghao Liu
Fan Yang
Helen Zhou
97
42
0
20 Mar 2023
Model Barrier: A Compact Un-Transferable Isolation Domain for Model Intellectual Property Protection
Lianyu Wang
Meng Wang
Daoqiang Zhang
Huazhu Fu
62
18
0
20 Mar 2023
A Recipe for Watermarking Diffusion Models
Yunqing Zhao
Tianyu Pang
Chao Du
Xiao Yang
Ngai-Man Cheung
Min Lin
WIGM
103
124
0
17 Mar 2023
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation
Yifan Yan
Xudong Pan
Mi Zhang
Min Yang
AAML
153
17
0
17 Mar 2023
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
AAML
93
22
0
27 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
112
23
0
19 Feb 2023
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
87
1
0
08 Feb 2023
Protecting Language Generation Models via Invisible Watermarking
Xuandong Zhao
Yu-Xiang Wang
Lei Li
WaLM
105
87
0
06 Feb 2023
Revisiting Personalized Federated Learning: Robustness Against Backdoor Attacks
Zeyu Qin
Liuyi Yao
Daoyuan Chen
Yaliang Li
Bolin Ding
Minhao Cheng
FedML
145
27
0
03 Feb 2023
A Watermark for Large Language Models
John Kirchenbauer
Jonas Geiping
Yuxin Wen
Jonathan Katz
Ian Miers
Tom Goldstein
VLM
WaLM
177
510
0
24 Jan 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
64
4
0
18 Jan 2023
Device-Bind Key-Storageless Hardware AI Model IP Protection: A PUF and Permute-Diffusion Encryption-Enabled Approach
Qianqian Pan
M. Dong
K. Ota
Jun Wu
20
6
0
21 Dec 2022
ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline
Haodi Wang
Thang Hoang
73
11
0
11 Dec 2022
A Systematic Literature Review On Privacy Of Deep Learning Systems
Vishal Jignesh Gandhi
Sanchit Shokeen
Saloni Koshti
PILM
62
1
0
07 Dec 2022
Mixer: DNN Watermarking using Image Mixup
Kassem Kallas
Teddy Furon
WIGM
76
4
0
06 Dec 2022
Federated Learning Attacks and Defenses: A Survey
Yao Chen
Yijie Gui
Hong Lin
Wensheng Gan
Yongdong Wu
FedML
84
31
0
27 Nov 2022
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Jacob Shams
Ben Nassi
I. Morikawa
Toshiya Shimizu
A. Shabtai
Yuval Elovici
AAML
34
1
0
24 Nov 2022
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks
Seonhye Park
A. Abuadbba
Shuo Wang
Kristen Moore
Yansong Gao
Hyoungshick Kim
Surya Nepal
AAML
53
2
0
24 Nov 2022
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Shuo Shao
Wenyuan Yang
Hanlin Gu
Zhan Qin
Lixin Fan
Qiang Yang
Kui Ren
FedML
89
33
0
14 Nov 2022
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Wenyuan Yang
Shuo Shao
Yue Yang
Xiyao Liu
Ximeng Liu
Zhihua Xia
Gerald Schaefer
Hui Fang
FedML
77
23
0
14 Nov 2022
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
Reda Bellafqira
Gouenou Coatrieux
102
6
0
27 Oct 2022
On the Robustness of Dataset Inference
S. Szyller
Rui Zhang
Enchao Gong
Nadarajah Asokan
AAML
62
6
0
24 Oct 2022
Unsupervised Non-transferable Text Classification
Guangtao Zeng
Wei Lu
92
6
0
23 Oct 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
Ran He
AAML
MLAU
111
31
0
21 Oct 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
79
19
0
14 Oct 2022
Watermarking Pre-trained Language Models with Backdooring
Chenxi Gu
Chengsong Huang
Xiaoqing Zheng
Kai-Wei Chang
Cho-Jui Hsieh
WaLM
58
47
0
14 Oct 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features
Mingfu Xue
Xin Wang
Ying-Chang Wu
S. Ni
Yushu Zhang
Weiqiang Liu
132
2
0
14 Oct 2022
Distillation-Resistant Watermarking for Model Protection in NLP
Xuandong Zhao
Lei Li
Yu-Xiang Wang
WaLM
134
20
0
07 Oct 2022
Hiding Images in Deep Probabilistic Models
Haoyu Chen
Linqi Song
Zhenxing Qian
Xinpeng Zhang
Kede Ma
AAML
63
10
0
05 Oct 2022
Membership Inference Attacks Against Text-to-image Generation Models
Yixin Wu
Ning Yu
Zheng Li
Michael Backes
Yang Zhang
DiffM
79
68
0
03 Oct 2022
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks
Zhi Qin Tan
H. P. Wong
Chee Seng Chan
66
1
0
03 Oct 2022
Generative Model Watermarking Based on Human Visual System
Li Zhang
Yong-Jin Liu
Shaoteng Liu
Tianshu Yang
Yexin Wang
Xinpeng Zhang
Han-Yan Wu
55
5
0
30 Sep 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
63
2
0
29 Sep 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
140
110
0
27 Sep 2022
Robust and Lossless Fingerprinting of Deep Neural Networks via Pooled Membership Inference
Hanzhou Wu
80
2
0
09 Sep 2022
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Peizhuo Lv
Pan Li
Shenchen Zhu
Shengzhi Zhang
Kai Chen
...
Fan Xiang
Yuling Cai
Hualong Ma
Yingjun Zhang
Guozhu Meng
AAML
86
7
0
08 Sep 2022
Supervised GAN Watermarking for Intellectual Property Protection
Jianwei Fei
Zhihua Xia
B. Tondi
Mauro Barni
WIGM
GAN
189
51
0
07 Sep 2022
Solving the Capsulation Attack against Backdoor-based Deep Neural Network Watermarks by Reversing Triggers
Fangqi Li
Shilin Wang
Yun Zhu
AAML
40
1
0
30 Aug 2022
NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
F. H. Shezan
Yingjie Lao
Minlong Peng
Xin Wang
Mingming Sun
Ping Li
47
3
0
29 Aug 2022
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
59
0
0
28 Aug 2022
Previous
1
2
3
4
5
6
7
8
Next