{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:37:13Z","timestamp":1758267433057,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031109881"},{"type":"electronic","value":"9783031109898"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10989-8_57","type":"book-chapter","created":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T22:30:36Z","timestamp":1658183436000},"page":"722-733","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["PUF-Based Intellectual Property Protection for\u00a0CNN Model"],"prefix":"10.1007","author":[{"given":"Dawei","family":"Li","sequence":"first","affiliation":[]},{"given":"Yangkun","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Di","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Qianyun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yanzhao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,19]]},"reference":[{"key":"57_CR1","first-page":"316","volume":"118","author":"Z Lu","year":"2018","unstructured":"Lu, Z., Wang, N., et al.: IoTDeM: an IoT big data-oriented MapReduce performance prediction extended model in multiple edge clouds. JPDC 118, 316\u2013327 (2018)","journal-title":"JPDC"},{"key":"57_CR2","first-page":"155","volume":"44","author":"M Liu","year":"2012","unstructured":"Liu, M., Zhang, S., et al.: H infinite state estimation for discrete-time chaotic systems based on a unified model. IEEE Trans. SMC (B) 44, 155\u2013168 (2012)","journal-title":"IEEE Trans. SMC (B)"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Ciregan, D., Meier, U., Schmidhuber, J.: Multi-column deep neural networks for image classification. In: IEEE CVPR, pp. 3642\u20133649 (2012)","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"57_CR5","unstructured":"Sharir, O., Peleg, B., Shoham, Y.: The cost of training NLP models: A concise overview. arXiv preprint arXiv:2004.08900 (2020)"},{"key":"57_CR6","unstructured":"Chen, H., Rouhani, B.D., et al.: Performance comparison of contemporary DNN watermarking techniques. arXiv preprint arXiv:1811.03713 (2018)"},{"key":"57_CR7","doi-asserted-by":"crossref","unstructured":"Darvish Rouhani, B., Chen, H., Koushanfar, F.: DeepSigns: an end-to-end watermarking framework for ownership protection of deep neural networks. In: 24th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 485\u2013497 (2019)","DOI":"10.1145\/3297858.3304051"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Uchida, Y., Nagai, Y., et al.: Embedding watermarks into deep neural networks. In: ACM International Conference on Multimedia Retrieval, pp. 269\u2013277 (2017)","DOI":"10.1145\/3078971.3078974"},{"key":"57_CR9","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.future.2017.08.004","volume":"87","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. FGCS 87, 772\u2013781 (2018)","journal-title":"FGCS"},{"issue":"4","key":"57_CR10","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TC.2006.59","volume":"55","author":"Z Shao","year":"2006","unstructured":"Shao, Z., Xue, C., et al.: Security protection and checking for embedded system integration against buffer overflow attacks via hardware\/software. IEEE Trans. Comput. 55(4), 443\u2013453 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"57_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gu, Z., et al.: Protecting intellectual property of deep neural networks with watermarking. In: Asia Conference on Computer and Communications Security, pp. 159\u2013172 (2018)","DOI":"10.1145\/3196494.3196550"},{"key":"57_CR12","unstructured":"Adi, Y., Baum, C., Cisse, M., et al.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1615\u20131631 (2018)"},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Guo, J., Potkonjak, M.: Watermarking deep neural networks for embedded systems. In: IEEE\/ACM ICCAD, pp. 1\u20138 (2018)","DOI":"10.1145\/3240765.3240862"},{"issue":"7","key":"57_CR14","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/TCSVT.2020.3030671","volume":"31","author":"H Wu","year":"2020","unstructured":"Wu, H., Liu, G., Yao, Y., Zhang, X.: Watermarking neural networks with watermarked images. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2591\u20132601 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Szyller, S., Atli, B.G., Marchal, S., Asokan, N.: DAWN: dynamic adversarial watermarking of neural networks. In: 29th ACM International Conference on Multimedia, pp. 4417\u20134425 (2021)","DOI":"10.1145\/3474085.3475591"},{"key":"57_CR16","doi-asserted-by":"crossref","unstructured":"Chen, J., Wang, J., et al.: Copy, right? A testing framework for copyright protection of deep learning models. arXiv preprint arXiv:2112.05588 (2021)","DOI":"10.1109\/SP46214.2022.9833747"},{"key":"57_CR17","unstructured":"Li, Y., Zhu, L., et al.: Defending against model stealing via verifying embedded external features. arXiv preprint arXiv:2112.03476 (2021)"},{"issue":"3","key":"57_CR18","first-page":"513","volume":"36","author":"C Wang","year":"2016","unstructured":"Wang, C., Gong, L., et al.: DLAU: a scalable deep learning accelerator unit on FPGA. IEEE TCAD 36(3), 513\u2013517 (2016)","journal-title":"IEEE TCAD"},{"key":"57_CR19","doi-asserted-by":"publisher","first-page":"7823","DOI":"10.1109\/ACCESS.2018.2890150","volume":"7","author":"A Shawahna","year":"2018","unstructured":"Shawahna, A., Sait, S.M., El-Maleh, A.: FPGA-based accelerators of deep learning networks for learning and classification: a review. IEEE Access 7, 7823\u20137859 (2018)","journal-title":"IEEE Access"},{"key":"57_CR20","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhang, K., et al.: T-DLA: an open-source deep learning accelerator for ternarized DNN models on embedded FPGA. In: IEEE Symposium on VLSI (ISVLSI), pp. 13\u201318 (2019)","DOI":"10.1109\/ISVLSI.2019.00012"},{"key":"57_CR21","doi-asserted-by":"crossref","unstructured":"Sun, P., Cui, A.: A new pay-per-use scheme for the protection of FPGA IP. In: IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20135 (2019)","DOI":"10.1109\/ISCAS.2019.8702721"},{"key":"57_CR22","first-page":"2548","volume":"16","author":"N Khan","year":"2021","unstructured":"Khan, N., Nitzsche, S., L\u00f3pez, O.: Utilizing and extending trusted execution environment in heterogeneous SoCs for a pay-per-device IP licensing scheme. IEEE TIFS 16, 2548\u20132563 (2021)","journal-title":"IEEE TIFS"},{"key":"57_CR23","doi-asserted-by":"crossref","unstructured":"Guo, Q., Ye, J., et al.: PUF based pay-per-device scheme for IP protection of CNN model. In: IEEE 27th Asian Test Symposium (ATS), pp. 115\u2013120 (2018)","DOI":"10.1109\/ATS.2018.00032"},{"issue":"42","key":"57_CR24","first-page":"172","volume":"34","author":"H Qiu","year":"2019","unstructured":"Qiu, H., Qiu, M., Lu, R.: Secure V2X communication network based on intelligent PKI and edge computing. IEEE Network 34(42), 172\u2013178 (2019)","journal-title":"IEEE Network"},{"issue":"3","key":"57_CR25","first-page":"2124","volume":"17","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Zheng, Q., et al.: Deep residual learning-based enhanced jpeg compression in the internet of things. IEEE TII 17(3), 2124\u20132133 (2020)","journal-title":"IEEE TII"},{"issue":"5","key":"57_CR26","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1016\/j.jcss.2012.11.002","volume":"79","author":"M Qiu","year":"2013","unstructured":"Qiu, M., Zhang, L., et al.: Security-aware optimization for ubiquitous computing systems with seat graph approach. J. Comput. Syst. Sci. 79(5), 518\u2013529 (2013)","journal-title":"J. Comput. Syst. Sci."},{"key":"57_CR27","doi-asserted-by":"crossref","unstructured":"Chakraborty, A., Mondai, A., Srivastava, A.: Hardware-assisted intellectual property protection of deep learning models. In: 57th ACM\/IEEE DAC, pp. 1\u20136 (2020)","DOI":"10.1109\/DAC18072.2020.9218651"},{"issue":"4","key":"57_CR28","first-page":"2833","volume":"17","author":"Y Li","year":"2020","unstructured":"Li, Y., Song, Y., et al.: Intelligent fault diagnosis by fusing domain adversarial training and maximum mean discrepancy via ensemble learning. IEEE TII 17(4), 2833\u20132841 (2020)","journal-title":"IEEE TII"},{"key":"57_CR29","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.inffus.2019.07.012","volume":"55","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59\u201367 (2020)","journal-title":"Inf. Fusion"},{"issue":"5589","key":"57_CR30","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026\u20132030 (2002)","journal-title":"Science"},{"key":"57_CR31","unstructured":"Lee, J.W., Lim, D., Gassend, B., et al.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 04CH37525), pp. 176\u2013179 (2004)"},{"key":"57_CR32","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 44th ACM\/IEEE DAC Conference, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"57_CR33","unstructured":"Holcomb, D.E., Burleson, W.P., et al.: Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Conference on RFID Security, vol. 7, p. 01 (2007)"},{"key":"57_CR34","doi-asserted-by":"crossref","unstructured":"Nguyen, P.H., Sahoo, D.P., et al.: The interpose PUF: secure PUF design against state-of-the-art machine learning attacks. Cryptology ePrint Archive (2018)","DOI":"10.46586\/tches.v2019.i4.243-290"},{"key":"57_CR35","doi-asserted-by":"crossref","unstructured":"Wang, Y., Xi, X., Orshansky, M.: Lattice PUF: a strong physical unclonable function provably secure against machine learning attacks. In: IEEE HOST, pp. 273\u2013283 (2020)","DOI":"10.1109\/HOST45689.2020.9300270"},{"key":"57_CR36","doi-asserted-by":"crossref","unstructured":"Ruhrmair, U., Solter, J.: PUF modeling attacks: an introduction and overview. In: 2014 DATE Conference (2014)","DOI":"10.7873\/DATE.2014.361"},{"key":"57_CR37","unstructured":"Berger, J.O.: Statistical Decision Theory and Bayesian Analysis. Springer Science & Business Media (2013)"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10989-8_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T22:39:35Z","timestamp":1676155175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10989-8_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031109881","9783031109898"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10989-8_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ksem22.smart-conf.net\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"498","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"169","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}