ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.04633
  4. Cited By
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks
  by Backdooring
v1v2v3 (latest)

Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring

13 February 2018
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
ArXiv (abs)PDFHTML

Papers citing "Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"

50 / 370 papers shown
Title
Auditing Membership Leakages of Multi-Exit Networks
Auditing Membership Leakages of Multi-Exit Networks
Zheng Li
Yiyong Liu
Xinlei He
Ning Yu
Michael Backes
Yang Zhang
AAML
73
34
0
23 Aug 2022
Robust and Large-Payload DNN Watermarking via Fixed,
  Distribution-Optimized, Weights
Robust and Large-Payload DNN Watermarking via Fixed, Distribution-Optimized, Weights
B. Tondi
Andrea Costanzo
Mauro Barni
28
4
0
23 Aug 2022
Customized Watermarking for Deep Neural Networks via Label Distribution
  Perturbation
Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation
Tzu-Yun Chien
Chih-Ya Shen
AAML
32
1
0
10 Aug 2022
DeepHider: A Covert NLP Watermarking Framework Based on Multi-task
  Learning
DeepHider: A Covert NLP Watermarking Framework Based on Multi-task Learning
Long Dai
Jiarong Mao
Xuefeng Fan
Xiaoyi Zhou
34
2
0
09 Aug 2022
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive
  Learning
AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Tianxing Zhang
Hanzhou Wu
Xiaofeng Lu
Guangling Sun
AAML
66
5
0
08 Aug 2022
Robust and Imperceptible Black-box DNN Watermarking Based on Fourier
  Perturbation Analysis and Frequency Sensitivity Clustering
Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering
Yong-Jin Liu
Hanzhou Wu
Xinpeng Zhang
AAML
85
9
0
08 Aug 2022
FBI: Fingerprinting models with Benign Inputs
FBI: Fingerprinting models with Benign Inputs
Thibault Maho
Teddy Furon
Erwan Le Merrer
AAML
63
4
0
05 Aug 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
103
14
0
04 Aug 2022
Deep Fidelity in DNN Watermarking: A Study of Backdoor Watermarking for
  Classification Models
Deep Fidelity in DNN Watermarking: A Study of Backdoor Watermarking for Classification Models
Guang Hua
Andrew Beng Jin Teoh
103
14
0
01 Aug 2022
DynaMarks: Defending Against Deep Learning Model Extraction Using
  Dynamic Watermarking
DynaMarks: Defending Against Deep Learning Model Extraction Using Dynamic Watermarking
Abhishek Chakraborty
Daniel Xing
Yuntao Liu
Ankur Srivastava
AAMLMLAU
45
7
0
27 Jul 2022
Certified Neural Network Watermarks with Randomized Smoothing
Certified Neural Network Watermarks with Randomized Smoothing
Arpit Bansal
Ping Yeh-Chiang
Michael J. Curry
R. Jain
Curtis Wigington
Varun Manjunatha
John P. Dickerson
Tom Goldstein
AAML
118
41
0
16 Jul 2022
Image and Model Transformation with Secret Key for Vision Transformer
Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya
Ryota Iijima
Maungmaung Aprilpyone
Yuma Kinoshita
ViT
78
21
0
12 Jul 2022
A Secure Fingerprinting Framework for Distributed Image Classification
Guowen Xu
Xingshuo Han
Anguo Zhang
Tianwei Zhang
FedML
52
0
0
11 Jul 2022
Conflicting Interactions Among Protection Mechanisms for Machine
  Learning Models
Conflicting Interactions Among Protection Mechanisms for Machine Learning Models
S. Szyller
Nadarajah Asokan
AAML
111
7
0
05 Jul 2022
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models
  in Model
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Xudong Pan
Yifan Yan
Sheng Zhang
Mi Zhang
Min Yang
67
1
0
29 Jun 2022
How to Steer Your Adversary: Targeted and Efficient Model Stealing
  Defenses with Gradient Redirection
How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection
Mantas Mazeika
Yangqiu Song
David A. Forsyth
AAML
60
28
0
28 Jun 2022
ROSE: A RObust and SEcure DNN Watermarking
ROSE: A RObust and SEcure DNN Watermarking
Kassem Kallas
Teddy Furon
37
7
0
22 Jun 2022
Access Control of Semantic Segmentation Models Using Encrypted Feature
  Maps
Access Control of Semantic Segmentation Models Using Encrypted Feature Maps
Hiroki Ito
AprilPyone Maungmaung
Sayaka Shiota
Hitoshi Kiya
45
4
0
11 Jun 2022
Membership Inference via Backdooring
Membership Inference via Backdooring
Hongsheng Hu
Z. Salcic
Gillian Dobbie
Jinjun Chen
Lichao Sun
Xuyun Zhang
MIACV
72
31
0
10 Jun 2022
PCPT and ACPT: Copyright Protection and Traceability Scheme for DNN
  Models
PCPT and ACPT: Copyright Protection and Traceability Scheme for DNN Models
Xuefeng Fan
Dahao Fu
Hangyu Gui
Xinpeng Zhang
Xiaoyi Zhou
81
4
0
06 Jun 2022
Integrity Authentication in Tree Models
Integrity Authentication in Tree Models
Weijie Zhao
Yingjie Lao
Ping Li
145
5
0
30 May 2022
Verifying Integrity of Deep Ensemble Models by Lossless Black-box
  Watermarking with Sensitive Samples
Verifying Integrity of Deep Ensemble Models by Lossless Black-box Watermarking with Sensitive Samples
Lina Lin
Hanzhou Wu
AAML
162
6
0
09 May 2022
A Survey on AI Sustainability: Emerging Trends on Learning Algorithms
  and Research Challenges
A Survey on AI Sustainability: Emerging Trends on Learning Algorithms and Research Challenges
Zhenghua Chen
Min-man Wu
Alvin Chan
Xiaoli Li
Yew-Soon Ong
51
7
0
08 May 2022
Cracking White-box DNN Watermarks via Invariant Neuron Transforms
Cracking White-box DNN Watermarks via Invariant Neuron Transforms
Yifan Yan
Xudong Pan
Yining Wang
Mi Zhang
Min Yang
AAML
51
14
0
30 Apr 2022
Eliminating Backdoor Triggers for Deep Neural Networks Using Attention
  Relation Graph Distillation
Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation
Jun Xia
Ting Wang
Jiepin Ding
Xian Wei
Mingsong Chen
AAML
60
34
0
21 Apr 2022
Planting Undetectable Backdoors in Machine Learning Models
Planting Undetectable Backdoors in Machine Learning Models
S. Goldwasser
Michael P. Kim
Vinod Vaikuntanathan
Or Zamir
AAML
62
73
0
14 Apr 2022
Stealing and Evading Malware Classifiers and Antivirus at Low False
  Positive Conditions
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions
M. Rigaki
Sebastian Garcia
AAML
74
11
0
13 Apr 2022
Knowledge-Free Black-Box Watermark and Ownership Proof for Image
  Classification Neural Networks
Knowledge-Free Black-Box Watermark and Ownership Proof for Image Classification Neural Networks
Fangqi Li
Shilin Wang
33
1
0
09 Apr 2022
Attention Distraction: Watermark Removal Through Continual Learning with
  Selective Forgetting
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting
Qi Zhong
L. Zhang
Shengshan Hu
Longxiang Gao
Jun Zhang
Yang Xiang
WIGMAAML
79
5
0
05 Apr 2022
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in
  Deep Learning
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Arezoo Rajabi
Bhaskar Ramasubramanian
Radha Poovendran
AAML
112
5
0
25 Mar 2022
PublicCheck: Public Integrity Verification for Services of Run-time Deep
  Models
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models
Shuo Wang
Sharif Abuadbba
Sidharth Agarwal
Kristen Moore
Ruoxi Sun
Minhui Xue
Surya Nepal
S. Çamtepe
S. Kanhere
HILM
68
7
0
21 Mar 2022
HoneyModels: Machine Learning Honeypots
HoneyModels: Machine Learning Honeypots
Ahmed Abdou
Ryan Sheatsley
Yohan Beugin
Tyler J. Shipp
Patrick McDaniel
AAML
53
3
0
21 Feb 2022
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in
  Eliminating Data Bias
Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias
Shangxi Wu
Qi He
Yi Zhang
Jitao Sang
AAML
106
2
0
18 Feb 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial
  Perturbations
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAMLFedML
117
68
0
17 Feb 2022
Algorithmic audits of algorithms, and the law
Algorithmic audits of algorithms, and the law
Erwan Le Merrer
Ronan Pons
Gilles Trédan
MLAUFaML
77
12
0
15 Feb 2022
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
A Survey of Neural Trojan Attacks and Defenses in Deep Learning
Jie Wang
Ghulam Mubashar Hassan
Naveed Akhtar
AAML
76
26
0
15 Feb 2022
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on
  Spread-Spectrum Channel Coding
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Giulio Pagnotta
Dorjan Hitaj
Briland Hitaj
Fernando Perez-Cruz
L. Mancini
78
5
0
12 Feb 2022
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained
  Encoders
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong
Xinlei He
Yang Zhang
92
55
0
27 Jan 2022
An Overview of Compressible and Learnable Image Transformation with
  Secret Key and Its Applications
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Hitoshi Kiya
AprilPyone Maungmaung
Yuma Kinoshita
Shoko Imaizumi
Sayaka Shiota
86
58
0
26 Jan 2022
Increasing the Cost of Model Extraction with Calibrated Proof of Work
Increasing the Cost of Model Extraction with Calibrated Proof of Work
Adam Dziedzic
Muhammad Ahmad Kaleem
Y. Lu
Nicolas Papernot
FedMLMIACVAAMLMLAU
130
29
0
23 Jan 2022
FedComm: Federated Learning as a Medium for Covert Communication
FedComm: Federated Learning as a Medium for Covert Communication
Dorjan Hitaj
Giulio Pagnotta
Briland Hitaj
Fernando Perez-Cruz
L. Mancini
FedML
79
12
0
21 Jan 2022
Watermarking Pre-trained Encoders in Contrastive Learning
Watermarking Pre-trained Encoders in Contrastive Learning
Yutong Wu
Han Qiu
Tianwei Zhang
L. Jiwei
M. Qiu
75
11
0
20 Jan 2022
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image
  Encoders
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Zeyang Sha
Xinlei He
Ning Yu
Michael Backes
Yang Zhang
138
35
0
19 Jan 2022
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
Xudong Pan
Yifan Yan
Mi Zhang
Min Yang
92
24
0
19 Jan 2022
Adversarial Machine Learning Threat Analysis and Remediation in Open
  Radio Access Network (O-RAN)
Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)
Edan Habler
Ron Bitton
D. Avraham
D. Mimran
Eitan Klevansky
Oleg Brodt
Heiko Lehmann
Yuval Elovici
A. Shabtai
AAML
87
14
0
16 Jan 2022
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning
Yupei Liu
Jinyuan Jia
Hongbin Liu
Neil Zhenqiang Gong
MIACV
90
26
0
15 Jan 2022
Copy, Right? A Testing Framework for Copyright Protection of Deep
  Learning Models
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models
Jialuo Chen
Jingyi Wang
Tinglan Peng
Youcheng Sun
Peng Cheng
S. Ji
Xingjun Ma
Yue Liu
Basel Alomair
AAML
92
64
0
10 Dec 2021
Defending against Model Stealing via Verifying Embedded External
  Features
Defending against Model Stealing via Verifying Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yong Jiang
Shutao Xia
Xiaochun Cao
AAML
88
65
0
07 Dec 2021
Protecting Intellectual Property of Language Generation APIs with
  Lexical Watermark
Protecting Intellectual Property of Language Generation APIs with Lexical Watermark
Xuanli He
Xingliang Yuan
Lingjuan Lyu
Fangzhao Wu
Chenguang Wang
WaLM
244
98
0
05 Dec 2021
Safe Distillation Box
Safe Distillation Box
Jingwen Ye
Yining Mao
Mingli Song
Xinchao Wang
Cheng Jin
Xiuming Zhang
AAML
111
14
0
05 Dec 2021
Previous
12345678
Next