ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2310.14942
  4. Cited By
Domain Watermark: Effective and Harmless Dataset Copyright Protection is
  Closed at Hand

Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand

9 October 2023
Junfeng Guo
Yiming Li
Lixu Wang
Shu-Tao Xia
Heng-Chiao Huang
Cong Liu
Boheng Li
ArXivPDFHTML

Papers citing "Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand"

45 / 45 papers shown
Title
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
CBW: Towards Dataset Ownership Verification for Speaker Verification via Clustering-based Backdoor Watermarking
Yiming Li
Kaiying Yan
Shuo Shao
Tongqing Zhai
Shu-Tao Xia
Zhan Qin
D. Tao
AAML
286
0
0
02 Mar 2025
Data Watermarking for Sequential Recommender Systems
Data Watermarking for Sequential Recommender Systems
Sixiao Zhang
Cheng Long
Wei Yuan
Hongxu Chen
Hongzhi Yin
95
0
0
20 Nov 2024
SoK: Dataset Copyright Auditing in Machine Learning Systems
SoK: Dataset Copyright Auditing in Machine Learning Systems
L. Du
Xuanru Zhou
M. Chen
Chusong Zhang
Zhou Su
Peng Cheng
Jiming Chen
Zhikun Zhang
MLAU
80
5
0
22 Oct 2024
Ward: Provable RAG Dataset Inference via LLM Watermarks
Ward: Provable RAG Dataset Inference via LLM Watermarks
Nikola Jovanović
Robin Staab
Maximilian Baader
Martin Vechev
364
4
0
04 Oct 2024
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
Kaiyi Pang
Tao Qi
Chuhan Wu
Minhao Bai
Minghu Jiang
Yongfeng Huang
AAML
WaLM
91
3
0
03 May 2024
Label Poisoning is All You Need
Label Poisoning is All You Need
Rishi Jha
J. Hayase
Sewoong Oh
AAML
46
30
0
29 Oct 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification
  Systems
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
52
12
0
13 Sep 2023
One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training
One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training
Jianshuo Dong
Han Qiu
Yiming Li
Tianwei Zhang
Yuan-Fang Li
Zeqi Lai
Chao Zhang
Shutao Xia
AAML
45
13
0
12 Aug 2023
Did You Train on My Dataset? Towards Public Dataset Protection with
  Clean-Label Backdoor Watermarking
Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Ruixiang Tang
Qizhang Feng
Ninghao Liu
Fan Yang
Xia Hu
46
37
0
20 Mar 2023
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via
  Analyzing Scaled Prediction Consistency
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Junfeng Guo
Yiming Li
Xun Chen
Hanqing Guo
Lichao Sun
Cong Liu
AAML
MLAU
45
104
0
07 Feb 2023
BackdoorBox: A Python Toolbox for Backdoor Learning
BackdoorBox: A Python Toolbox for Backdoor Learning
Yiming Li
Mengxi Ya
Yang Bai
Yong Jiang
Shutao Xia
AAML
51
40
0
01 Feb 2023
DEJA VU: Continual Model Generalization For Unseen Domains
DEJA VU: Continual Model Generalization For Unseen Domains
Chenxi Liu
Lixu Wang
Lingjuan Lyu
Chen Sun
Tianlin Li
Qi Zhu
CLL
OOD
73
22
0
25 Jan 2023
Few-shot Backdoor Attacks via Neural Tangent Kernels
Few-shot Backdoor Attacks via Neural Tangent Kernels
J. Hayase
Sewoong Oh
52
21
0
12 Oct 2022
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset
  Copyright Protection
Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Yiming Li
Yang Bai
Yong Jiang
Yong-Liang Yang
Shutao Xia
Bo Li
AAML
87
104
0
27 Sep 2022
Black-box Dataset Ownership Verification via Backdoor Watermarking
Black-box Dataset Ownership Verification via Backdoor Watermarking
Yiming Li
Mingyan Zhu
Xue Yang
Yong Jiang
Tao Wei
Shutao Xia
AAML
55
78
0
04 Aug 2022
Towards a Defense Against Federated Backdoor Attacks Under Continuous
  Training
Towards a Defense Against Federated Backdoor Attacks Under Continuous Training
Shuai Wang
J. Hayase
Giulia Fanti
Sewoong Oh
FedML
54
5
0
24 May 2022
PolicyCleanse: Backdoor Detection and Mitigation in Reinforcement
  Learning
PolicyCleanse: Backdoor Detection and Mitigation in Reinforcement Learning
Junfeng Guo
Ang Li
Cong Liu
AAML
40
16
0
08 Feb 2022
Backdoor Defense via Decoupling the Training Process
Backdoor Defense via Decoupling the Training Process
Kunzhe Huang
Yiming Li
Baoyuan Wu
Zhan Qin
Kui Ren
AAML
FedML
51
193
0
05 Feb 2022
Few-Shot Backdoor Attacks on Visual Object Tracking
Few-Shot Backdoor Attacks on Visual Object Tracking
Yiming Li
Haoxiang Zhong
Xingjun Ma
Yong Jiang
Shutao Xia
AAML
64
54
0
31 Jan 2022
AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value
  Analysis
AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Junfeng Guo
Ang Li
Cong Liu
AAML
96
76
0
28 Oct 2021
Adversarial Neuron Pruning Purifies Backdoored Deep Models
Adversarial Neuron Pruning Purifies Backdoored Deep Models
Dongxian Wu
Yisen Wang
AAML
81
282
0
27 Oct 2021
Learning to Diversify for Single Domain Generalization
Learning to Diversify for Single Domain Generalization
Zijian Wang
Yadan Luo
Ruihong Qiu
Zi Huang
Mahsa Baktash
92
256
0
26 Aug 2021
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks
  Trained from Scratch
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch
Hossein Souri
Liam H. Fowl
Ramalingam Chellappa
Micah Goldblum
Tom Goldstein
SILM
58
128
0
16 Jun 2021
Non-Transferable Learning: A New Approach for Model Ownership
  Verification and Applicability Authorization
Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization
Lixu Wang
Shichao Xu
Ruiqi Xu
Tianlin Li
Qi Zhu
AAML
95
47
0
13 Jun 2021
Neural Mean Discrepancy for Efficient Out-of-Distribution Detection
Neural Mean Discrepancy for Efficient Out-of-Distribution Detection
Xin Dong
Junfeng Guo
Ang Li
W. Ting
Cong Liu
H. T. Kung
OODD
70
59
0
23 Apr 2021
SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics
SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics
J. Hayase
Weihao Kong
Raghav Somani
Sewoong Oh
AAML
41
153
0
22 Apr 2021
Backdoor Attack in the Physical World
Backdoor Attack in the Physical World
Yiming Li
Tongqing Zhai
Yong Jiang
Zhifeng Li
Shutao Xia
52
112
0
06 Apr 2021
Weak Adaptation Learning -- Addressing Cross-domain Data Insufficiency
  with Weak Annotator
Weak Adaptation Learning -- Addressing Cross-domain Data Insufficiency with Weak Annotator
Shichao Xu
Lixu Wang
Yixuan Wang
Qi Zhu
40
15
0
15 Feb 2021
Unlearnable Examples: Making Personal Data Unexploitable
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
Yisen Wang
MIACV
215
193
0
13 Jan 2021
Input-Aware Dynamic Backdoor Attack
Input-Aware Dynamic Backdoor Attack
A. Nguyen
Anh Tran
AAML
65
430
0
16 Oct 2020
FakeTagger: Robust Safeguards against DeepFake Dissemination via
  Provenance Tracking
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking
Run Wang
Felix Juefei Xu
Mengqing Luo
Yang Liu
Lina Wang
63
75
0
21 Sep 2020
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
Jonas Geiping
Liam H. Fowl
Wenjie Huang
W. Czaja
Gavin Taylor
Michael Moeller
Tom Goldstein
AAML
84
219
0
04 Sep 2020
Backdoor Learning: A Survey
Backdoor Learning: A Survey
Yiming Li
Yong Jiang
Zhifeng Li
Shutao Xia
AAML
95
602
0
17 Jul 2020
CLUB: A Contrastive Log-ratio Upper Bound of Mutual Information
CLUB: A Contrastive Log-ratio Upper Bound of Mutual Information
Pengyu Cheng
Weituo Hao
Shuyang Dai
Jiachang Liu
Zhe Gan
Lawrence Carin
VLM
54
352
0
22 Jun 2020
Visual Privacy Protection via Mapping Distortion
Visual Privacy Protection via Mapping Distortion
Yiming Li
Peidong Liu
Yong Jiang
Shutao Xia
47
10
0
05 Nov 2019
Deep Leakage from Gradients
Deep Leakage from Gradients
Ligeng Zhu
Zhijian Liu
Song Han
FedML
92
2,200
0
21 Jun 2019
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
D. Song
AAML
SILM
120
1,837
0
15 Dec 2017
Neural Trojans
Neural Trojans
Yuntao Liu
Yang Xie
Ankur Srivastava
AAML
49
353
0
03 Oct 2017
Halftone Image Watermarking by Content Aware Double-sided Embedding
  Error Diffusion
Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion
Yuanfang Guo
O. Au
Rui Wang
Lu Fang
Xiaochun Cao
DiffM
33
27
0
18 Jul 2017
Membership Inference Attacks against Machine Learning Models
Membership Inference Attacks against Machine Learning Models
Reza Shokri
M. Stronati
Congzheng Song
Vitaly Shmatikov
SLR
MIALM
MIACV
238
4,120
0
18 Oct 2016
Deep Residual Learning for Image Recognition
Deep Residual Learning for Image Recognition
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
MedIm
2.2K
193,814
0
10 Dec 2015
A New PAC-Bayesian Perspective on Domain Adaptation
A New PAC-Bayesian Perspective on Domain Adaptation
Pascal Germain
Amaury Habrard
François Laviolette
Emilie Morvant
58
64
0
15 Jun 2015
Risk Bounds for the Majority Vote: From a PAC-Bayesian Analysis to a
  Learning Algorithm
Risk Bounds for the Majority Vote: From a PAC-Bayesian Analysis to a Learning Algorithm
Pascal Germain
A. Lacasse
François Laviolette
M. Marchand
Jean-Francis Roy
53
142
0
28 Mar 2015
Very Deep Convolutional Networks for Large-Scale Image Recognition
Very Deep Convolutional Networks for Large-Scale Image Recognition
Karen Simonyan
Andrew Zisserman
FAtt
MDE
1.6K
100,330
0
04 Sep 2014
Rényi Divergence and Kullback-Leibler Divergence
Rényi Divergence and Kullback-Leibler Divergence
T. Erven
P. Harremoes
79
1,338
0
12 Jun 2012
1