ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.04633
  4. Cited By
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks
  by Backdooring
v1v2v3 (latest)

Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring

13 February 2018
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
ArXiv (abs)PDFHTML

Papers citing "Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"

50 / 370 papers shown
Title
FedSOV: Federated Model Secure Ownership Verification with Unforgeable
  Signature
FedSOV: Federated Model Secure Ownership Verification with Unforgeable Signature
Wenyuan Yang
Gongxi Zhu
Yuguo Yin
Hanlin Gu
Lixin Fan
Qiang Yang
Xiaochun Cao
FedML
63
6
0
10 May 2023
FedZKP: Federated Model Ownership Verification with Zero-knowledge Proof
FedZKP: Federated Model Ownership Verification with Zero-knowledge Proof
Wenyuan Yang
Yuguo Yin
Gongxi Zhu
Hanlin Gu
Lixin Fan
Xiaochun Cao
Qiang Yang
FedML
78
9
0
08 May 2023
Text-to-Image Diffusion Models can be Easily Backdoored through
  Multimodal Data Poisoning
Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning
Shengfang Zhai
Yinpeng Dong
Qingni Shen
Shih-Chieh Pu
Yuejian Fang
Hang Su
73
77
0
07 May 2023
NNSplitter: An Active Defense Solution for DNN Model via Automated
  Weight Obfuscation
NNSplitter: An Active Defense Solution for DNN Model via Automated Weight Obfuscation
Tong Zhou
Yukui Luo
Shaolei Ren
Xiaolin Xu
AAML
94
20
0
28 Apr 2023
Identifying Appropriate Intellectual Property Protection Mechanisms for
  Machine Learning Models: A Systematization of Watermarking, Fingerprinting,
  Model Access, and Attacks
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
Isabell Lederer
Rudolf Mayer
Andreas Rauber
98
19
0
22 Apr 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
84
10
0
17 Apr 2023
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
Nils Lukas
Florian Kerschbaum
WIGM
102
24
0
14 Apr 2023
False Claims against Model Ownership Resolution
False Claims against Model Ownership Resolution
Jian Liu
Rui Zhang
S. Szyller
Kui Ren
Nirmal Asokan
AAMLMLAU
123
12
0
13 Apr 2023
Do Backdoors Assist Membership Inference Attacks?
Do Backdoors Assist Membership Inference Attacks?
Yumeki Goto
Nami Ashizawa
Toshiki Shibahara
Naoto Yanai
MIACV
61
2
0
22 Mar 2023
Effective Ambiguity Attack Against Passport-based DNN Intellectual
  Property Protection Schemes through Fully Connected Layer Substitution
Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Yiming Chen
Jinyu Tian
Xiangyu Chen
Jiantao Zhou
AAML
80
11
0
21 Mar 2023
Did You Train on My Dataset? Towards Public Dataset Protection with
  Clean-Label Backdoor Watermarking
Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Ruixiang Tang
Qizhang Feng
Ninghao Liu
Fan Yang
Helen Zhou
97
42
0
20 Mar 2023
Model Barrier: A Compact Un-Transferable Isolation Domain for Model
  Intellectual Property Protection
Model Barrier: A Compact Un-Transferable Isolation Domain for Model Intellectual Property Protection
Lianyu Wang
Meng Wang
Daoqiang Zhang
Huazhu Fu
62
18
0
20 Mar 2023
A Recipe for Watermarking Diffusion Models
A Recipe for Watermarking Diffusion Models
Yunqing Zhao
Tianyu Pang
Chao Du
Xiao Yang
Ngai-Man Cheung
Min Lin
WIGM
103
124
0
17 Mar 2023
Rethinking White-Box Watermarks on Deep Learning Models under Neural
  Structural Obfuscation
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation
Yifan Yan
Xudong Pan
Mi Zhang
Min Yang
AAML
153
17
0
17 Mar 2023
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
AAML
93
22
0
27 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
112
23
0
19 Feb 2023
On Function-Coupled Watermarks for Deep Neural Networks
On Function-Coupled Watermarks for Deep Neural Networks
Xiangyu Wen
Yu Li
Weizhen Jiang
Qian-Lan Xu
AAML
87
1
0
08 Feb 2023
Protecting Language Generation Models via Invisible Watermarking
Protecting Language Generation Models via Invisible Watermarking
Xuandong Zhao
Yu-Xiang Wang
Lei Li
WaLM
105
87
0
06 Feb 2023
Revisiting Personalized Federated Learning: Robustness Against Backdoor
  Attacks
Revisiting Personalized Federated Learning: Robustness Against Backdoor Attacks
Zeyu Qin
Liuyi Yao
Daoyuan Chen
Yaliang Li
Bolin Ding
Minhao Cheng
FedML
145
27
0
03 Feb 2023
A Watermark for Large Language Models
A Watermark for Large Language Models
John Kirchenbauer
Jonas Geiping
Yuxin Wen
Jonathan Katz
Ian Miers
Tom Goldstein
VLMWaLM
177
510
0
24 Jan 2023
Threats, Vulnerabilities, and Controls of Machine Learning Based
  Systems: A Survey and Taxonomy
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy
Yusuke Kawamoto
Kazumasa Miyake
K. Konishi
Y. Oiwa
64
4
0
18 Jan 2023
Device-Bind Key-Storageless Hardware AI Model IP Protection: A PUF and
  Permute-Diffusion Encryption-Enabled Approach
Device-Bind Key-Storageless Hardware AI Model IP Protection: A PUF and Permute-Diffusion Encryption-Enabled Approach
Qianqian Pan
M. Dong
K. Ota
Jun Wu
20
6
0
21 Dec 2022
ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference
  Pipeline
ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline
Haodi Wang
Thang Hoang
73
11
0
11 Dec 2022
A Systematic Literature Review On Privacy Of Deep Learning Systems
A Systematic Literature Review On Privacy Of Deep Learning Systems
Vishal Jignesh Gandhi
Sanchit Shokeen
Saloni Koshti
PILM
62
1
0
07 Dec 2022
Mixer: DNN Watermarking using Image Mixup
Mixer: DNN Watermarking using Image Mixup
Kassem Kallas
Teddy Furon
WIGM
76
4
0
06 Dec 2022
Federated Learning Attacks and Defenses: A Survey
Federated Learning Attacks and Defenses: A Survey
Yao Chen
Yijie Gui
Hong Lin
Wensheng Gan
Yongdong Wu
FedML
84
31
0
27 Nov 2022
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision
  Models
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models
Jacob Shams
Ben Nassi
I. Morikawa
Toshiya Shimizu
A. Shabtai
Yuval Elovici
AAML
34
1
0
24 Nov 2022
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify
  Proprietary Dataset Use in Deep Neural Networks
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks
Seonhye Park
A. Abuadbba
Shuo Wang
Kristen Moore
Yansong Gao
Hyoungshick Kim
Surya Nepal
AAML
53
2
0
24 Nov 2022
FedTracker: Furnishing Ownership Verification and Traceability for
  Federated Learning Model
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model
Shuo Shao
Wenyuan Yang
Hanlin Gu
Zhan Qin
Lixin Fan
Qiang Yang
Kui Ren
FedML
89
33
0
14 Nov 2022
Watermarking in Secure Federated Learning: A Verification Framework
  Based on Client-Side Backdooring
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring
Wenyuan Yang
Shuo Shao
Yue Yang
Xiyao Liu
Ximeng Liu
Zhihua Xia
Gerald Schaefer
Hui Fang
FedML
77
23
0
14 Nov 2022
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
DICTION:DynamIC robusT whIte bOx watermarkiNg scheme for deep neural networks
Reda Bellafqira
Gouenou Coatrieux
102
6
0
27 Oct 2022
On the Robustness of Dataset Inference
On the Robustness of Dataset Inference
S. Szyller
Rui Zhang
Enchao Gong
Nadarajah Asokan
AAML
62
6
0
24 Oct 2022
Unsupervised Non-transferable Text Classification
Unsupervised Non-transferable Text Classification
Guangtao Zeng
Wei Lu
92
6
0
23 Oct 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep
  Neural Networks
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
Ran He
AAMLMLAU
111
31
0
21 Oct 2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural
  Networks
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
79
19
0
14 Oct 2022
Watermarking Pre-trained Language Models with Backdooring
Watermarking Pre-trained Language Models with Backdooring
Chenxi Gu
Chengsong Huang
Xiaoqing Zheng
Kai-Wei Chang
Cho-Jui Hsieh
WaLM
58
47
0
14 Oct 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based
  on Intrinsic Features
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features
Mingfu Xue
Xin Wang
Ying-Chang Wu
S. Ni
Yushu Zhang
Weiqiang Liu
132
2
0
14 Oct 2022
Distillation-Resistant Watermarking for Model Protection in NLP
Distillation-Resistant Watermarking for Model Protection in NLP
Xuandong Zhao
Lei Li
Yu-Xiang Wang
WaLM
134
20
0
07 Oct 2022
Hiding Images in Deep Probabilistic Models
Hiding Images in Deep Probabilistic Models
Haoyu Chen
Linqi Song
Zhenxing Qian
Xinpeng Zhang
Kede Ma
AAML
63
10
0
05 Oct 2022
Membership Inference Attacks Against Text-to-image Generation Models
Membership Inference Attacks Against Text-to-image Generation Models
Yixin Wu
Ning Yu
Zheng Li
Michael Backes
Yang Zhang
DiffM
79
68
0
03 Oct 2022
An Embarrassingly Simple Approach for Intellectual Property Rights
  Protection on Recurrent Neural Networks
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks
Zhi Qin Tan
H. P. Wong
Chee Seng Chan
66
1
0
03 Oct 2022
Generative Model Watermarking Based on Human Visual System
Generative Model Watermarking Based on Human Visual System
Li Zhang
Yong-Jin Liu
Shaoteng Liu
Tianshu Yang
Yexin Wang
Xinpeng Zhang
Han-Yan Wu
55
5
0
30 Sep 2022
Access Control with Encrypted Feature Maps for Object Detection Models
Access Control with Encrypted Feature Maps for Object Detection Models
Teru Nagamori
Hiroki Ito
AprilPyone Maungmaung
Hitoshi Kiya
63
2
0
29 Sep 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset
  Copyright Protection
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
140
110
0
27 Sep 2022
Robust and Lossless Fingerprinting of Deep Neural Networks via Pooled
  Membership Inference
Robust and Lossless Fingerprinting of Deep Neural Networks via Pooled Membership Inference
Hanzhou Wu
80
2
0
09 Sep 2022
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by
  Self-supervised Learning
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Peizhuo Lv
Pan Li
Shenchen Zhu
Shengzhi Zhang
Kai Chen
...
Fan Xiang
Yuling Cai
Hualong Ma
Yingjun Zhang
Guozhu Meng
AAML
86
7
0
08 Sep 2022
Supervised GAN Watermarking for Intellectual Property Protection
Supervised GAN Watermarking for Intellectual Property Protection
Jianwei Fei
Zhihua Xia
B. Tondi
Mauro Barni
WIGMGAN
189
51
0
07 Sep 2022
Solving the Capsulation Attack against Backdoor-based Deep Neural
  Network Watermarks by Reversing Triggers
Solving the Capsulation Attack against Backdoor-based Deep Neural Network Watermarks by Reversing Triggers
Fangqi Li
Shilin Wang
Yun Zhu
AAML
40
1
0
30 Aug 2022
NL2GDPR: Automatically Develop GDPR Compliant Android Application
  Features from Natural Language
NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
F. H. Shezan
Yingjie Lao
Minlong Peng
Xin Wang
Mingming Sun
Ping Li
47
3
0
29 Aug 2022
An Access Control Method with Secret Key for Semantic Segmentation
  Models
An Access Control Method with Secret Key for Semantic Segmentation Models
Teru Nagamori
Ryota Iijima
Hitoshi Kiya
59
0
0
28 Aug 2022
Previous
12345678
Next