{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:42:19Z","timestamp":1761000139107,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535422"},{"type":"electronic","value":"9789819535439"}],"license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3543-9_23","type":"book-chapter","created":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T11:03:25Z","timestamp":1760871805000},"page":"424-441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hierarchical Recovery of Convolutional Neural Networks via Self-embedding Watermarking"],"prefix":"10.1007","author":[{"given":"Yawen","family":"Huang","sequence":"first","affiliation":[]},{"given":"Huaicong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.patcog.2017.10.013","volume":"77","author":"J Gu","year":"2018","unstructured":"Gu, J., et al.: Recent advances in convolutional neural networks. Pattern Recogn. 77, 354\u2013377 (2018)","journal-title":"Pattern Recogn."},{"key":"23_CR2","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: Badnets: identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)"},{"issue":"5","key":"23_CR3","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s11760-012-0312-6","volume":"8","author":"E Walia","year":"2014","unstructured":"Walia, E., Suneja, A.: A robust watermark authentication technique based on weber\u2019s descriptor. SIViP 8(5), 859\u2013872 (2014)","journal-title":"SIViP"},{"issue":"2","key":"23_CR4","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1007\/s11042-018-6322-9","volume":"78","author":"NR Zhou","year":"2019","unstructured":"Zhou, N.R., Luo, A.W., Zou, W.P.: Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimedia Tools Appl. 78(2), 2507\u20132523 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.dsp.2017.11.005","volume":"73","author":"S Bravo-Solorio","year":"2018","unstructured":"Bravo-Solorio, S., Calderon, F., Li, C.T., Nandi, A.K.: Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit. Signal Process. 73, 83\u201392 (2018)","journal-title":"Digit. Signal Process."},{"issue":"2","key":"23_CR6","doi-asserted-by":"publisher","first-page":"103","DOI":"10.4236\/opj.2013.32B026","volume":"3","author":"CM Wu","year":"2013","unstructured":"Wu, C.M., Shih, Y.S.: A simple image tamper detection and recovery based on fragile watermark with one parity section and two restoration sections. Opt. Photonics J. 3(2), 103\u2013107 (2013)","journal-title":"Opt. Photonics J."},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Uchida, Y., Nagai, Y., Sakazawa, S., Satoh, S.: Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, pp. 269\u2013277 (2017)","DOI":"10.1145\/3078971.3078974"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 159\u2013172 (2018)","DOI":"10.1145\/3196494.3196550"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Darvish\u00a0Rouhani, B., Chen, H., Koushanfar, F.: Deepsigns: an end-to-end watermarking framework for ownership protection of deep neural networks. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 485\u2013497 (2019)","DOI":"10.1145\/3297858.3304051"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Chen, H., Rouhani, B.D., Fu, C., Zhao, J., Koushanfar, F.: Deepmarks: a secure fingerprinting framework for digital rights management of deep learning models. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval, pp. 105\u2013113 (2019)","DOI":"10.1145\/3323873.3325042"},{"key":"23_CR11","unstructured":"Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 1615\u20131631 (2018)"},{"issue":"13","key":"23_CR12","doi-asserted-by":"publisher","first-page":"9233","DOI":"10.1007\/s00521-019-04434-z","volume":"32","author":"E Le Merrer","year":"2020","unstructured":"Le Merrer, E., Perez, P., Tr\u00e9dan, G.: Adversarial frontier stitching for remote neural network watermarking. Neural Comput. Appl. 32(13), 9233\u20139244 (2020)","journal-title":"Neural Comput. Appl."},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Namba, R., Sakuma, J.: Robust watermarking of neural network with exponential weighting. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 228\u2013240 (2019)","DOI":"10.1145\/3321705.3329808"},{"key":"23_CR14","unstructured":"He, Z., Zhang, T., Lee, R.B.: Verideep: verifying integrity of deep neural networks through sensitive-sample fingerprinting. arXiv preprint arXiv:1808.03277 (2018)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Guan, X., Feng, H., Zhang, W., Zhou, H., Zhang, J., Yu, N.: Reversible watermarking in deep convolutional neural networks for integrity authentication. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 2273\u20132280 (2020)","DOI":"10.1145\/3394171.3413729"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, R., Wei, P., Li, S., Yin, Z., Zhang, X., Qian, Z.: Fragile neural network watermarking with trigger image set. In: Proceedings of the International Conference on Knowledge Science, Engineering and Management. pp. 280\u2013293. Springer (2021)","DOI":"10.1007\/978-3-030-82136-4_23"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Lao, Y., Zhao, W., Yang, P., Li, P.: Deepauth: a DNN authentication framework by model-unique and fragile signature embedding. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 9595\u20139603 (2022)","DOI":"10.1609\/aaai.v36i9.21193"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ins.2021.06.073","volume":"576","author":"M Botta","year":"2021","unstructured":"Botta, M., Cavagnino, D., Esposito, R.: Neunac: a novel fragile watermarking algorithm for integrity protection of neural networks. Inf. Sci. 576, 228\u2013241 (2021)","journal-title":"Inf. Sci."},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Abuadbba, A., Kim, H., Nepal, S.: Deepisign: invisible fragile watermark to protect the integrity and authenticity of CNN. In: Proceedings of the 36th Annual ACM Symposium on Applied Computing, pp. 952\u2013959 (2021)","DOI":"10.1145\/3412841.3441970"},{"issue":"20","key":"23_CR20","doi-asserted-by":"publisher","first-page":"24056","DOI":"10.1007\/s10489-023-04797-w","volume":"53","author":"Y Huang","year":"2023","unstructured":"Huang, Y., Zheng, H., Xiao, D.: Convolutional neural networks tamper detection and location based on fragile watermarking. Appl. Intell. 53(20), 24056\u201324067 (2023)","journal-title":"Appl. Intell."},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Xiong, C., Feng, G., Li, X., Zhang, X., Qin, C.: Neural network model protection with piracy identification and tampering localization capability. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 2881\u20132889 (2022)","DOI":"10.1145\/3503161.3548247"},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.patrec.2022.10.013","volume":"164","author":"G Zhao","year":"2022","unstructured":"Zhao, G., Qin, C., Yao, H., Han, Y.: DNN self-embedding watermarking: towards tampering detection and parameter recovery for deep neural network. Pattern Recogn. Lett. 164, 16\u201322 (2022)","journal-title":"Pattern Recogn. Lett."},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Meng, F., et al.: Filter grafting for deep neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6599\u20136607 (2020)","DOI":"10.1109\/CVPR42600.2020.00663"},{"key":"23_CR24","unstructured":"Luo, J.H., Wu, J.: An entropy-based pruning method for CNN compression. arXiv preprint arXiv:1706.05791 (2017)"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: Exploiting kernel sparsity and entropy for interpretable CNN compression. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2800\u20132809 (2019)","DOI":"10.1109\/CVPR.2019.00291"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3543-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:04:08Z","timestamp":1760997848000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3543-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"ISBN":["9789819535422","9789819535439"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3543-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,20]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}