{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:57:51Z","timestamp":1743011871133,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031736490"},{"type":"electronic","value":"9783031736506"}],"license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73650-6_16","type":"book-chapter","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T18:16:15Z","timestamp":1732126575000},"page":"273-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Not Just Change the\u00a0Labels, Learn the\u00a0Features: Watermarking Deep Neural Networks with\u00a0Multi-view Data"],"prefix":"10.1007","author":[{"given":"Yuxuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Sarthak Kumar","family":"Maharana","sequence":"additional","affiliation":[]},{"given":"Yunhui","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"16_CR1","unstructured":"Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1615\u20131631 (2018)"},{"key":"16_CR2","unstructured":"Bansal\u00a0et al., A.: Certified neural network watermarks with randomized smoothing. In: ICML (2022)"},{"key":"16_CR3","unstructured":"Allen-Zhu, Z., Li, Y.: Towards understanding ensemble, knowledge distillation and self-distillation in deep learning. arXiv preprint arXiv:2012.09816 (2020)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Chen, H., Rohani, B.D., Koushanfar, F.: Deepmarks: a digital fingerprinting framework for deep neural networks. arXiv preprint arXiv:1804.03648 (2018)","DOI":"10.1145\/3323873.3325042"},{"key":"16_CR5","unstructured":"Chiang, P.Y., Ni, R., Abdelkader, A., Zhu, C., Studer, C., Goldstein, T.: Certified defenses for adversarial patches. arXiv preprint arXiv:2003.06693 (2020)"},{"key":"16_CR6","unstructured":"Cover, T.M.: Elements of Information Theory. Wiley, Hoboken (1999)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Darvish\u00a0Rouhani, B., Chen, H., Koushanfar, F.: Deepsigns: An end-to-end watermarking framework for ownership protection of deep neural networks. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 485\u2013497 (2019)","DOI":"10.1145\/3297858.3304051"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Deng, L., Platt, J.: Ensemble deep learning for speech recognition. In: Proceedings of Interspeech (2014)","DOI":"10.21437\/Interspeech.2014-433"},{"key":"16_CR10","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"16_CR11","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"16_CR12","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: Badnets: identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)"},{"key":"16_CR13","unstructured":"Guo, J., Li, Y., Wang, L., Xia, S.T., Huang, H., Liu, C., Li, B.: Domain watermark: Effective and harmless dataset copyright protection is closed at hand. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"},{"key":"16_CR14","unstructured":"Hannun, A., et\u00a0al.: Deep speech: scaling up end-to-end speech recognition. arXiv preprint arXiv:1412.5567 (2014)"},{"issue":"7","key":"16_CR15","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079\u20131107 (1999)","journal-title":"Proc. IEEE"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask r-cnn. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2961\u20132969 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"16_CR18","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)"},{"key":"16_CR19","unstructured":"Jia, H., Choquette-Choo, C.A., Chandrasekaran, V., Papernot, N.: Entangled watermarks as a defense against model extraction. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 1937\u20131954 (2021)"},{"key":"16_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14596-5","volume-title":"Deep Learning for NLP and Speech Recognition","author":"U Kamath","year":"2019","unstructured":"Kamath, U., Liu, J., Whitaker, J.: Deep Learning for NLP and Speech Recognition. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-14596-5"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Kiefer, J., Wolfowitz, J.: Stochastic estimation of the maximum of a regression function. In: The Annals of Mathematical Statistics, pp. 462\u2013466 (1952)","DOI":"10.1214\/aoms\/1177729392"},{"key":"16_CR22","unstructured":"Kim, B., Lee, S., Lee, S., Son, S., Hwang, S.J.: Margin-based neural network watermarking. International Conference on Machine Learning (2023)"},{"key":"16_CR23","unstructured":"Kim, H., et\u00a0al.: Nsml: meet the mlaas platform with a real-world case study. arXiv preprint arXiv:1810.09957 (2018)"},{"key":"16_CR24","unstructured":"Kirillov, A., et\u00a0al.: Segment anything. arXiv preprint arXiv:2304.02643 (2023)"},{"key":"16_CR25","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"16_CR26","first-page":"13238","volume":"35","author":"Y Li","year":"2022","unstructured":"Li, Y., Bai, Y., Jiang, Y., Yang, Y., Xia, S.T., Li, B.: Untargeted backdoor watermark: towards harmless and stealthy dataset copyright protection. Adv. Neural. Inf. Process. Syst. 35, 13238\u201313250 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Li, Y., Zhu, L., Jia, X., Jiang, Y., Xia, S.T., Cao, X.: Defending against model stealing via verifying embedded external features. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 1464\u20131472 (2022)","DOI":"10.1609\/aaai.v36i2.20036"},{"key":"16_CR28","doi-asserted-by":"publisher","first-page":"2318","DOI":"10.1109\/TIFS.2023.3265535","volume":"18","author":"Y Li","year":"2023","unstructured":"Li, Y., Zhu, M., Yang, X., Jiang, Y., Wei, T., Xia, S.T.: Black-box dataset ownership verification via backdoor watermarking. IEEE Trans. Inf. Forensics Secur. 18, 2318\u20132332 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Li, Z., Hu, C., Zhang, Y., Guo, S.: How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 126\u2013137 (2019)","DOI":"10.1145\/3359789.3359801"},{"key":"16_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-030-00470-5_13","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"K Liu","year":"2018","unstructured":"Liu, K., Dolan-Gavitt, B., Garg, S.: Fine-pruning: defending against backdooring attacks on deep neural networks. In: Bailey, M., Holz, T., Stamatogiannakis, M., Ioannidis, S. (eds.) RAID 2018. LNCS, vol. 11050, pp. 273\u2013294. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00470-5_13"},{"key":"16_CR31","unstructured":"Lopez, M.M., Kalita, J.: Deep learning applied to NLP. arXiv preprint arXiv:1703.03091 (2017)"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Lukas, N., Jiang, E., Li, X., Kerschbaum, F.: Sok: how robust is image classification deep neural network watermarking? In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 787\u2013804. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833693"},{"key":"16_CR33","unstructured":"Lukas, N., Zhang, Y., Kerschbaum, F.: Deep neural network fingerprinting by conferrable adversarial examples. arXiv preprint arXiv:1912.00888 (2019)"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Ma, C., Chen, L., Yong, J.H.: Simulating unknown target models for query-efficient black-box attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11835\u201311844 (2021)","DOI":"10.1109\/CVPR46437.2021.01166"},{"issue":"11","key":"16_CR35","first-page":"2579","volume":"9","author":"L Van der Maaten","year":"2008","unstructured":"Van der Maaten, L., Hinton, G.: Visualizing data using t-sne. J. Mach. Learn. Res. 9(11), 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"16_CR36","unstructured":"Maini, P., Yaghini, M., Papernot, N.: Dataset inference: ownership resolution in machine learning. arXiv preprint arXiv:2104.10706 (2021)"},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Namba, R., Sakuma, J.: Robust watermarking of neural network with exponential weighting. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 228\u2013240 (2019)","DOI":"10.1145\/3321705.3329808"},{"key":"16_CR38","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., Ng, A.Y.: Reading digits in natural images with unsupervised feature learning (2011)"},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M.: Knockoff nets: stealing functionality of black-box models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4954\u20134963 (2019)","DOI":"10.1109\/CVPR.2019.00509"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 506\u2013519 (2017)","DOI":"10.1145\/3052973.3053009"},{"issue":"5","key":"16_CR41","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TNNLS.2020.2991378","volume":"32","author":"Y Quan","year":"2020","unstructured":"Quan, Y., Teng, H., Chen, Y., Ji, H.: Watermarking deep neural networks in image processing. IEEE Trans. Neural Netw. Learn. Syst. 32(5), 1852\u20131865 (2020)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"16_CR42","doi-asserted-by":"crossref","unstructured":"Ribeiro, M., Grolinger, K., Capretz, M.A.: Mlaas: machine learning as a service. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 896\u2013902. IEEE (2015)","DOI":"10.1109\/ICMLA.2015.152"},{"key":"16_CR43","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Uchida, Y., Nagai, Y., Sakazawa, S., Satoh, S.: Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, pp. 269\u2013277 (2017)","DOI":"10.1145\/3078971.3078974"},{"key":"16_CR45","unstructured":"Wang, T., Kerschbaum, F.: Robust and undetectable white-box watermarks for deep neural networks. arXiv preprint arXiv:1910.142681(2) (2019)"},{"key":"16_CR46","doi-asserted-by":"publisher","unstructured":"Wang, Y., et al.: Black-box dissector: towards erasing-based hard-label model stealing attack. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) Computer Vision - ECCV 2022, ECCV 2022, LNCS, vol. 13665, pp. 192\u2013208. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20065-6_12","DOI":"10.1007\/978-3-031-20065-6_12"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Yang, P., Lao, Y., Li, P.: Robust watermarking for deep neural networks via bi-level optimization. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 14841\u201314850 (2021)","DOI":"10.1109\/ICCV48922.2021.01457"},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Yao, Y., Xiao, Z., Wang, B., Viswanath, B., Zheng, H., Zhao, B.Y.: Complexity vs. performance: empirical analysis of machine learning as a service. In: Proceedings of the 2017 Internet Measurement Conference, pp. 384\u2013397 (2017)","DOI":"10.1145\/3131365.3131372"},{"issue":"3","key":"16_CR49","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/3446776","volume":"64","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Bengio, S., Hardt, M., Recht, B., Vinyals, O.: Understanding deep learning (still) requires rethinking generalization. Commun. ACM 64(3), 107\u2013115 (2021)","journal-title":"Commun. ACM"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M.P., Huang, H., Molloy, I.: Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 159\u2013172 (2018)","DOI":"10.1145\/3196494.3196550"},{"issue":"5","key":"16_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3178115","volume":"9","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Geiger, J., Pohjalainen, J., Mousa, A.E.D., Jin, W., Schuller, B.: Deep learning for environmentally robust speech recognition: an overview of recent developments. ACM Trans. Intell. Syst. Technol. (TIST) 9(5), 1\u201328 (2018)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73650-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T19:06:46Z","timestamp":1732129606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73650-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,21]]},"ISBN":["9783031736490","9783031736506"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73650-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,21]]},"assertion":[{"value":"21 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}