Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2209.06015
Cited By
Black-box Dataset Ownership Verification via Backdoor Watermarking
4 August 2022
Yiming Li
Mingyan Zhu
Xue Yang
Yong Jiang
Tao Wei
Shutao Xia
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Black-box Dataset Ownership Verification via Backdoor Watermarking"
20 / 20 papers shown
Title
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi
Shu Wang
Isabelle Choi
Kun Sun
46
0
0
08 May 2025
Towards Dataset Copyright Evasion Attack against Personalized Text-to-Image Diffusion Models
Kuofeng Gao
Yufei Zhu
Yiming Li
Jiawang Bai
Yong-Liang Yang
Z. Li
Shu-Tao Xia
41
0
0
05 May 2025
Cert-SSB: Toward Certified Sample-Specific Backdoor Defense
Ting Qiao
Yue Wang
Xing Liu
Sixing Wu
Jianbing Li
Yiming Li
AAML
SILM
66
0
0
30 Apr 2025
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage
Wenqi Zhang
Ju Jia
Xiaojun Jia
Yihao Huang
Zhaoxin Fan
Cong Wu
Lina Wang
AAML
38
0
0
15 Apr 2025
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
Yiming Li
Kaiying Yan
Shuo Shao
Tongqing Zhai
Shu-Tao Xia
Zhan Qin
D. Tao
AAML
146
0
0
02 Mar 2025
Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning
Dayong Ye
Tainqing Zhu
Jiashi Li
Kun Gao
B. Liu
L. Zhang
Wanlei Zhou
Y. Zhang
AAML
MU
80
0
0
28 Jan 2025
Data Watermarking for Sequential Recommender Systems
Sixiao Zhang
Cheng Long
Wei Yuan
Hongxu Chen
Hongzhi Yin
2
0
0
20 Nov 2024
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
Kaiyi Pang
Tao Qi
Chuhan Wu
Minhao Bai
Minghu Jiang
Yongfeng Huang
AAML
WaLM
72
2
0
03 May 2024
Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand
Junfeng Guo
Yiming Li
Lixu Wang
Shu-Tao Xia
Heng-Chiao Huang
Cong Liu
Boheng Li
30
50
0
09 Oct 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network
Zi-Shun Huang
Boheng Li
Yan Cai
Run Wang
Shangwei Guo
Liming Fang
Jing Chen
Lina Wang
38
11
0
29 Jul 2023
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Stefanos Koffas
Yiming Li
AAML
26
28
0
17 Jul 2023
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks
Ziqiang Li
Hong Sun
Pengfei Xia
Beihao Xia
Xue Rui
Wei Zhang
Qinglang Guo
Bin Li
AAML
32
8
0
14 Jun 2023
Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Ruixiang Tang
Qizhang Feng
Ninghao Liu
Fan Yang
Xia Hu
26
36
0
20 Mar 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Run Wang
Jixing Ren
Boheng Li
Tianyi She
Wenhui Zhang
Liming Fang
Jing Chen
Chao Shen
Lina Wang
WIGM
32
16
0
14 Oct 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
44
12
0
04 Aug 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
38
53
0
31 Jan 2022
Manipulating SGD with Data Ordering Attacks
Ilia Shumailov
Zakhar Shumaylov
Dmitry Kazhdan
Yiren Zhao
Nicolas Papernot
Murat A. Erdogdu
Ross J. Anderson
AAML
112
90
0
19 Apr 2021
Deep Serial Number: Computational Watermarking for DNN Intellectual Property Protection
Ruixiang Tang
Mengnan Du
Xia Hu
35
3
0
17 Nov 2020
Convolutional Neural Networks for Sentence Classification
Yoon Kim
AILaw
VLM
255
13,364
0
25 Aug 2014
1