{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:27:46Z","timestamp":1759091266151,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030666255"},{"type":"electronic","value":"9783030666262"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-66626-2_3","type":"book-chapter","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T21:03:51Z","timestamp":1608584631000},"page":"46-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Re-markable: Stealing Watermarked Neural Networks Through Synthesis"],"prefix":"10.1007","author":[{"given":"Nandish","family":"Chattopadhyay","sequence":"first","affiliation":[]},{"given":"Chua Sheng Yang","family":"Viroy","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"3_CR1","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A., Bengio, Y.: Deep Learning, vol. 1. MIT Press, Cambridge (2016)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2009, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"185","DOI":"10.2174\/1389200219666180820112457","volume":"20","author":"N Stephenson","year":"2019","unstructured":"Stephenson, N., et al.: Survey of machine learning techniques in drug discovery. Curr. Drug Metab. 20(3), 185\u2013193 (2019)","journal-title":"Curr. Drug Metab."},{"key":"3_CR4","unstructured":"Mohseni, S., Zarei, N., Ragan, E.D.: A survey of evaluation methods and measures for interpretable machine learning. arXiv preprint arXiv:1811.11839 (2018)"},{"issue":"6","key":"3_CR5","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1037\/h0042519","volume":"65","author":"F Rosenblatt","year":"1958","unstructured":"Rosenblatt, F.: The perceptron: a probabilistic model for information storage and organization in the brain. Psychol. Rev. 65(6), 386 (1958)","journal-title":"Psychol. Rev."},{"key":"3_CR6","series-title":"Springer Series in Statistics","volume-title":"The Elements of Statistical Learning","author":"J Friedman","year":"2001","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: The Elements of Statistical Learning. Springer Series in Statistics, vol. 1. Springer, New York (2001)"},{"issue":"10","key":"3_CR7","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2009","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/b105846","volume-title":"Intellectual Property Protection in VLSI Designs: Theory and Practice","author":"G Qu","year":"2007","unstructured":"Qu, G., Potkonjak, M.: Intellectual Property Protection in VLSI Designs: Theory and Practice. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/b105846"},{"key":"3_CR9","unstructured":"Chen, H., Rouhani, B.D., Koushanfar, F.: Blackmarks: blackbox multibit watermarking for deep neural networks. arXiv preprint arXiv:1904.00344 (2019)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Chen, H., Rohani, B.D., Koushanfar, F.: DeepMarks: a digital fingerprinting framework for deep neural networks. arXiv preprint arXiv:1804.03648 (2018)","DOI":"10.1145\/3323873.3325042"},{"key":"3_CR11","unstructured":"Rouhani, B.D., Chen, H., Koushanfar, F.: DeepSigns: a generic watermarking framework for protecting the ownership of deep learning models"},{"key":"3_CR12","unstructured":"Szyller, S., Atli, B.G., Marchal, S., Asokan, N.: DAWN: dynamic adversarial watermarking of neural networks. arXiv preprint arXiv:1906.00830 (2019)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Chen, H., Fu, C., Zhao, J., Koushanfar, F.: DeepInspect: a black-box trojan detection and mitigation framework for deep neural networks. In: IJCAI, pp. 4658\u20134664 (2019)","DOI":"10.24963\/ijcai.2019\/647"},{"key":"3_CR14","unstructured":"Guo, W., Wang, L., Xing, X., Du, M., Song, D.: TABOR: a highly accurate approach to inspecting and restoring trojan backdoors in AI systems. arXiv preprint arXiv:1908.01763 (2019)"},{"key":"3_CR15","unstructured":"Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 18), pp. 1615\u20131631 (2018)"},{"key":"3_CR16","unstructured":"Goodfellow, I.: NIPS 2016 tutorial: generative adversarial networks. arXiv preprint arXiv:1701.00160 (2016)"},{"key":"3_CR17","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)"},{"key":"3_CR18","unstructured":"Springenberg, J.T., Dosovitskiy, A., Brox, T., Riedmiller, M.: Striving for simplicity: the all convolutional net. arXiv preprint arXiv:1412.6806 (2014)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Hitaj, D., Hitaj, B., Mancini, L.V.: Evasion attacks against watermarking techniques found in MLaaS systems. In: 2019 Sixth International Conference on Software Defined Systems (SDS), pp. 55\u201363. IEEE (2019)","DOI":"10.1109\/SDS.2019.8768572"},{"key":"3_CR20","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: 25th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 16), pp. 601\u2013618 (2016)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Torrey, L., Shavlik, J.: Transfer learning. In: Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques, pp. 242\u2013264. IGI global (2010)","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"3_CR22","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"3_CR23","unstructured":"Targ, S., Almeida, D., Lyman, K.: Resnet in resnet: generalizing residual architectures. arXiv preprint arXiv:1603.08029 (2016)"},{"key":"3_CR24","unstructured":"LeCun, Y., Cortes, C., Burges, C.J.: Mnist handwritten digit database. AT&T Labs, 2 (2010). http:\/\/yann.lecun.com\/exdb\/mnist"},{"key":"3_CR25","unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)"},{"key":"3_CR26","unstructured":"Krizhevsky, A., Nair, V., Hinton, G.: The CIFAR-10 dataset (2014). http:\/\/www.cs.toronto.edu\/kriz\/cifar.html"},{"key":"3_CR27","unstructured":"Paszke, A., et al. Pytorch: an imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems, pp. 8026\u20138037 (2019)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-66626-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:48:29Z","timestamp":1710269309000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-66626-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030666255","9783030666262"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-66626-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cse.iitkgp.ac.in\/conf\/SPACE2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}