ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.04633
  4. Cited By
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks
  by Backdooring
v1v2v3 (latest)

Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring

13 February 2018
Yossi Adi
Carsten Baum
Moustapha Cissé
Benny Pinkas
Joseph Keshet
ArXiv (abs)PDFHTML

Papers citing "Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring"

50 / 370 papers shown
Title
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for
  Machine Learning
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Vasisht Duddu
S. Szyller
Nadarajah Asokan
76
13
0
04 Dec 2021
An Overview of Backdoor Attacks Against Deep Neural Networks and
  Possible Defences
An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences
Wei Guo
B. Tondi
Mauro Barni
AAML
110
71
0
16 Nov 2021
You are caught stealing my winning lottery ticket! Making a lottery
  ticket claim its ownership
You are caught stealing my winning lottery ticket! Making a lottery ticket claim its ownership
Xuxi Chen
Tianlong Chen
Zhenyu Zhang
Zhangyang Wang
WIGM
77
23
0
30 Oct 2021
Watermarking Graph Neural Networks based on Backdoor Attacks
Watermarking Graph Neural Networks based on Backdoor Attacks
Jing Xu
Stefanos Koffas
Oguzhan Ersoy
S. Picek
AAML
87
32
0
21 Oct 2021
Speech Pattern based Black-box Model Watermarking for Automatic Speech
  Recognition
Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Haozhe Chen
Weiming Zhang
Kunlin Liu
Kejiang Chen
Han Fang
Nenghai Yu
37
4
0
19 Oct 2021
Don't Knock! Rowhammer at the Backdoor of DNN Models
Don't Knock! Rowhammer at the Backdoor of DNN Models
M. Tol
Saad Islam
Andrew J. Adiletta
B. Sunar
Ziming Zhang
AAML
88
18
0
14 Oct 2021
Sound and Complete Neural Network Repair with Minimality and Locality
  Guarantees
Sound and Complete Neural Network Repair with Minimality and Locality Guarantees
Feisi Fu
Wenchao Li
KELMAAML
98
26
0
14 Oct 2021
Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Tian Dong
Han Qiu
Tianwei Zhang
Jiwei Li
Hewu Li
Jialiang Lu
AAML
74
8
0
07 Oct 2021
Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep
  Learning
Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning
Ren Wang
Zhe Xu
Alfred Hero
66
0
0
06 Oct 2021
SoK: Machine Learning Governance
SoK: Machine Learning Governance
Varun Chandrasekaran
Hengrui Jia
Anvith Thudi
Adelin Travers
Mohammad Yaghini
Nicolas Papernot
137
16
0
20 Sep 2021
Protect the Intellectual Property of Dataset against Unauthorized Use
Protect the Intellectual Property of Dataset against Unauthorized Use
Mingfu Xue
Yinghao Wu
Yushu Zhang
Jian Wang
Weiqiang Liu
140
4
0
16 Sep 2021
Access Control Using Spatially Invariant Permutation of Feature Maps for
  Semantic Segmentation Models
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models
Hiroki Ito
Maungmaung Aprilpyone
Hitoshi Kiya
60
5
0
03 Sep 2021
Excess Capacity and Backdoor Poisoning
Excess Capacity and Backdoor Poisoning
N. Manoj
Avrim Blum
SILMAAML
83
24
0
02 Sep 2021
A Protection Method of Trained CNN Model Using Feature Maps Transformed
  With Secret Key From Unauthorized Access
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access
Maungmaung Aprilpyone
Hitoshi Kiya
54
5
0
01 Sep 2021
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks
Anuj Dubey
Rosario Cammarota
Vikram B. Suresh
Aydin Aysu
AAML
81
32
0
01 Sep 2021
Quantization Backdoors to Deep Learning Commercial Frameworks
Quantization Backdoors to Deep Learning Commercial Frameworks
Hua Ma
Huming Qiu
Yansong Gao
Zhi-Li Zhang
A. Abuadbba
Minhui Xue
Anmin Fu
Jiliang Zhang
S. Al-Sarawi
Derek Abbott
MQ
124
21
0
20 Aug 2021
Regulating Ownership Verification for Deep Neural Networks: Scenarios,
  Protocols, and Prospects
Regulating Ownership Verification for Deep Neural Networks: Scenarios, Protocols, and Prospects
Fangqi Li
Shi-Lin Wang
Alan Wee-Chung Liew
41
8
0
20 Aug 2021
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine
  learning-based genomic analysis
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Esha Sarkar
Michail Maniatakos
107
4
0
14 Aug 2021
SoK: How Robust is Image Classification Deep Neural Network
  Watermarking? (Extended Version)
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)
Nils Lukas
Edward Jiang
Xinda Li
Florian Kerschbaum
AAML
117
92
0
11 Aug 2021
Exploring Structure Consistency for Deep Model Watermarking
Exploring Structure Consistency for Deep Model Watermarking
Jie Zhang
Dongdong Chen
Jing Liao
Han Fang
Zehua Ma
Weiming Zhang
G. Hua
Nenghai Yu
AAML
60
4
0
05 Aug 2021
Structural Watermarking to Deep Neural Networks via Network Channel
  Pruning
Structural Watermarking to Deep Neural Networks via Network Channel Pruning
Xiangyu Zhao
Yinzhe Yao
Hanzhou Wu
Xinpeng Zhang
AAML
120
25
0
19 Jul 2021
HODA: Hardness-Oriented Detection of Model Extraction Attacks
HODA: Hardness-Oriented Detection of Model Extraction Attacks
A. M. Sadeghzadeh
Amir Mohammad Sobhanian
F. Dehghan
R. Jalili
MIACV
75
7
0
21 Jun 2021
Fingerprinting Image-to-Image Generative Adversarial Networks
Fingerprinting Image-to-Image Generative Adversarial Networks
Guanlin Li
Guowen Xu
Han Qiu
Shangwei Guo
Run Wang
Jiwei Li
Tianwei Zhang
Rongxing Lu
WIGM
65
0
0
19 Jun 2021
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in
  Deep Neural Networks
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
Suyoung Lee
Wonho Song
Suman Jana
M. Cha
Sooel Son
AAML
82
15
0
18 Jun 2021
Detect and remove watermark in deep neural networks via generative
  adversarial networks
Detect and remove watermark in deep neural networks via generative adversarial networks
Haoqi Wang
Mingfu Xue
Shichang Sun
Yushu Zhang
Jian Wang
Weiqiang Liu
AAML
68
12
0
15 Jun 2021
Non-Transferable Learning: A New Approach for Model Ownership
  Verification and Applicability Authorization
Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization
Lixu Wang
Shichao Xu
Ruiqi Xu
Tianlin Li
Qi Zhu
AAML
111
48
0
13 Jun 2021
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse
  Detection
ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Yan Liang
Ziqi Zhang
Bingyan Liu
Ziyue Yang
Yunxin Liu
69
53
0
11 Jun 2021
Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word
  Substitution
Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution
Fanchao Qi
Yuan Yao
Sophia Xu
Zhiyuan Liu
Maosong Sun
SILM
75
132
0
11 Jun 2021
A Protection Method of Trained CNN Model with Secret Key from
  Unauthorized Access
A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access
AprilPyone Maungmaung
Hitoshi Kiya
47
22
0
31 May 2021
AdvParams: An Active DNN Intellectual Property Protection Technique via
  Adversarial Perturbation Based Parameter Encryption
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption
Mingfu Xue
Zhiyu Wu
Jian Wang
Yushu Zhang
Weiqiang Liu
AAML
67
29
0
28 May 2021
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Siyue Wang
Xiao Wang
Pin-Yu Chen
Pu Zhao
Xue Lin
AAML
69
2
0
14 May 2021
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP
  Protection for Internet of Things
RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Huming Qiu
Hua Ma
Zhi-Li Zhang
Yifeng Zheng
Anmin Fu
Pan Zhou
Yansong Gao
Derek Abbott
S. Al-Sarawi
MQ
88
10
0
09 May 2021
Incompatibility Clustering as a Defense Against Backdoor Poisoning
  Attacks
Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks
Charles Jin
Melinda Sun
Martin Rinard
AAML
16
6
0
08 May 2021
Towards Practical Watermark for Deep Neural Networks in Federated
  Learning
Towards Practical Watermark for Deep Neural Networks in Federated Learning
Fangqi Li
Shi-Lin Wang
Alan Wee-Chung Liew
FedML
60
12
0
07 May 2021
Inspect, Understand, Overcome: A Survey of Practical Methods for AI
  Safety
Inspect, Understand, Overcome: A Survey of Practical Methods for AI Safety
Sebastian Houben
Stephanie Abrecht
Maram Akila
Andreas Bär
Felix Brockherde
...
Serin Varghese
Michael Weber
Sebastian J. Wirkert
Tim Wirtz
Matthias Woehrle
AAML
126
58
0
29 Apr 2021
Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against
  Image Translation Models
Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Models
S. Szyller
Vasisht Duddu
Tommi Gröndahl
Nirmal Asokan
MIACV
74
2
0
26 Apr 2021
Dataset Inference: Ownership Resolution in Machine Learning
Dataset Inference: Ownership Resolution in Machine Learning
Pratyush Maini
Mohammad Yaghini
Nicolas Papernot
FedML
150
110
0
21 Apr 2021
Protecting the Intellectual Properties of Deep Neural Networks with an
  Additional Class and Steganographic Images
Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images
Shichang Sun
Mingfu Xue
Jian Wang
Weiqiang Liu
AAML
44
21
0
19 Apr 2021
Reversible Watermarking in Deep Convolutional Neural Networks for
  Integrity Authentication
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication
Xiquan Guan
Huamin Feng
Weiming Zhang
Hang Zhou
Jie Zhang
Nenghai Yu
AAML
68
60
0
09 Apr 2021
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation
  with Secret Key
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
Maungmaung Aprilpyone
Hitoshi Kiya
106
18
0
09 Apr 2021
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right
  Piece for Ownership Verification in Deep Neural Networks
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks
Peizhuo Lv
Pan Li
Shengzhi Zhang
Kai Chen
Ruigang Liang
Yue Zhao
Yingjiu Li
AAML
27
5
0
25 Mar 2021
A survey of deep neural network watermarking techniques
A survey of deep neural network watermarking techniques
Yue Li
Hongxia Wang
Mauro Barni
127
148
0
16 Mar 2021
Automatically Lock Your Neural Networks When You're Away
Automatically Lock Your Neural Networks When You're Away
Ge Ren
Jun Wu
Gaolei Li
Shenghong Li
18
0
0
15 Mar 2021
Proof-of-Learning: Definitions and Practice
Proof-of-Learning: Definitions and Practice
Hengrui Jia
Mohammad Yaghini
Christopher A. Choquette-Choo
Natalie Dullerud
Anvith Thudi
Varun Chandrasekaran
Nicolas Papernot
AAML
84
106
0
09 Mar 2021
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse
  Document Frequency
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency
Mohammad Mehdi Yadollahi
Farzaneh Shoeleh
Sajjad Dadkhah
Ali A. Ghorbani
AAML
49
11
0
09 Mar 2021
Deep Model Intellectual Property Protection via Deep Watermarking
Deep Model Intellectual Property Protection via Deep Watermarking
Jie Zhang
Dongdong Chen
Jing Liao
Weiming Zhang
Huamin Feng
G. Hua
Nenghai Yu
121
107
0
08 Mar 2021
Don't Forget to Sign the Gradients!
Don't Forget to Sign the Gradients!
Omid Aramoon
Pin-Yu Chen
Gang Qu
55
5
0
05 Mar 2021
Transfer Learning-Based Model Protection With Secret Key
Transfer Learning-Based Model Protection With Secret Key
Maungmaung Aprilpyone
Hitoshi Kiya
FedML
41
5
0
05 Mar 2021
ActiveGuard: An Active DNN IP Protection Technique via Adversarial
  Examples
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples
Mingfu Xue
Shichang Sun
Can He
Yushu Zhang
Jian Wang
Weiqiang Liu
AAML
91
8
0
02 Mar 2021
Protecting Intellectual Property of Generative Adversarial Networks from
  Ambiguity Attack
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack
Ding Sheng Ong
Chee Seng Chan
KamWoh Ng
Lixin Fan
Qiang Yang
AAML
71
72
0
08 Feb 2021
Previous
12345678
Next