{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T07:25:15Z","timestamp":1774250715320,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819571437","type":"print"},{"value":"9789819571444","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-7144-4_41","type":"book-chapter","created":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T06:30:21Z","timestamp":1774247421000},"page":"446-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Legal Characterization of Reverse Engineering in Large-Scale AI Models: A Jurisprudential Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7661-6061","authenticated-orcid":false,"given":"Yiming","family":"Bao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7515-1942","authenticated-orcid":false,"given":"Meixin","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8292-6131","authenticated-orcid":false,"given":"Xiaowei","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"41_CR1","doi-asserted-by":"publisher","unstructured":"Wang, Y., Pan, Y., Yan, M., Su, Z., Luan, T.H.: A survey on ChatGPT: AI-Generated contents, challenges, and solutions. IEEE Open J. Comput. Soc. (Open Access), 1\u201319 (2023). https:\/\/doi.org\/10.48550\/arXiv.2305.18339","DOI":"10.48550\/arXiv.2305.18339"},{"issue":"3","key":"41_CR2","doi-asserted-by":"publisher","first-page":"605","DOI":"10.3969\/j.issn.1002-6274.2023.03.03","volume":"35","author":"H Zhou","year":"2023","unstructured":"Zhou, H.: Significance of interoperability and its legal construction. Peking Univ. Law J. 35(3), 605\u2013624 (2023). https:\/\/doi.org\/10.3969\/j.issn.1002-6274.2023.03.03","journal-title":"Peking Univ. Law J."},{"issue":"5","key":"41_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2022.3151419","volume":"55","author":"HY Lin","year":"2022","unstructured":"Lin, H.Y.: Large-scale artificial intelligence models. Computer 55(5), 76\u201380 (2022). https:\/\/doi.org\/10.1109\/MC.2022.3151419","journal-title":"Computer"},{"issue":"2","key":"41_CR4","doi-asserted-by":"publisher","first-page":"430","DOI":"10.2139\/ssrn.4665623","volume":"26","author":"IR Motoarca","year":"2024","unstructured":"Motoarca, I.R.: AI, Copyright, and Pseudo Art. Yale J. Law Technol. 26(2), 430\u2013526 (2024). https:\/\/doi.org\/10.2139\/ssrn.4665623","journal-title":"Yale J. Law Technol."},{"issue":"2","key":"41_CR5","doi-asserted-by":"publisher","first-page":"712","DOI":"10.13328\/j.cnki.jos.006699","volume":"34","author":"C Li","year":"2023","unstructured":"Li, C., Wang, S., Li, Y., et al.: Survey on reverse-engineering artificial intelligence. J. Softw. 34(2), 712\u2013732 (2023). https:\/\/doi.org\/10.13328\/j.cnki.jos.006699","journal-title":"J. Softw."},{"key":"41_CR6","doi-asserted-by":"publisher","unstructured":"Pearce, H., Tan, B., Krishnamurthy, P., Khorrami, F., Karri, R.: Pop Quiz! Can a large language model help with reverse engineering? (No publication information available.) arXiv preprint\u00a0 (2022). https:\/\/doi.org\/10.48550\/arXiv.2202.01142","DOI":"10.48550\/arXiv.2202.01142"},{"issue":"2","key":"41_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.16339\/j.cnki.hdxbskb.2023.02.019","volume":"37","author":"XQ Feng","year":"2023","unstructured":"Feng, X.Q., Hao, M.Y.: Research on the patent protection system for inventions generated by artificial intelligence. J. Hunan Univ. (Soc. Sci.) 37(2), 143\u2013152 (2023). https:\/\/doi.org\/10.16339\/j.cnki.hdxbskb.2023.02.019","journal-title":"J. Hunan Univ. (Soc. Sci.)"},{"issue":"1","key":"41_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.2139\/ssrn.2241680","volume":"17","author":"TM Evans","year":"2013","unstructured":"Evans, T.M.: Reverse engineering IP. Marquette Intellectual Property Law Rev. 17(1), 61\u2013102 (2013). https:\/\/doi.org\/10.2139\/ssrn.2241680","journal-title":"Marquette Intellectual Property Law Rev."},{"issue":"3","key":"41_CR9","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s40319-024-01432-0","volume":"55","author":"UM Mylly","year":"2024","unstructured":"Mylly, U.M.: Trade secrets and the Data Act. Intern. Rev. Intellectual Property Competition Law (IIC) 55(3), 368\u2013393 (2024). https:\/\/doi.org\/10.1007\/s40319-024-01432-0","journal-title":"Intern. Rev. Intellectual Property Competition Law (IIC)"},{"key":"41_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.16348\/j.cnki.cn61-1372\/c.2025.05.002","volume":"5","author":"X Feng","year":"2025","unstructured":"Feng, X., Li, K.: Reshaping the protection rules of trade secrets in the era of artificial intelligence. Intellect. Prop. 5, 21\u201338 (2025). https:\/\/doi.org\/10.16348\/j.cnki.cn61-1372\/c.2025.05.002","journal-title":"Intellect. Prop."},{"key":"41_CR11","doi-asserted-by":"publisher","unstructured":"Fei, Y., Zhou, W.: The function, relationship, and path for reverse engineering of trade secrets. Sci. Technol. Law Chin.-English (1), 71\u201377 (2021). https:\/\/doi.org\/10.19685\/j.cnki.cn11-2922\/n.2021.01.009","DOI":"10.19685\/j.cnki.cn11-2922\/n.2021.01.009"},{"issue":"4","key":"41_CR12","doi-asserted-by":"publisher","first-page":"633","DOI":"10.2139\/ssrn.3495725","volume":"93","author":"SN Alicia","year":"2020","unstructured":"Alicia, S.N.: Administering artificial intelligence. Southern California Law Rev. 93(4), 633\u2013696 (2020). https:\/\/doi.org\/10.2139\/ssrn.3495725","journal-title":"Southern California Law Rev."},{"key":"41_CR13","doi-asserted-by":"publisher","unstructured":"Moriarty, T.F.: The Legal Challenges of Generative AI\u2014Part 1: Skynet and HAL Walk into a Courtroom. Colorado Lawyer 52(4), 40\u201345 (2023). https:\/\/doi.org\/10.5280\/COLOL202307006","DOI":"10.5280\/COLOL202307006"},{"issue":"1","key":"41_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.15779\/Z38FT8DM21","volume":"40","author":"CA Hrdy","year":"2025","unstructured":"Hrdy, C.A.: Keeping ChatGPT trade secret while selling it too. Berkeley Technol. Law J. 40(1), 75\u2013164 (2025). https:\/\/doi.org\/10.15779\/Z38FT8DM21","journal-title":"Berkeley Technol. Law J."},{"issue":"1","key":"41_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.2139\/ssrn.2002757","volume":"15","author":"B Michael","year":"2012","unstructured":"Michael, B.: Reverse engineering informational privacy law. Yale J. Law Technol. 15(1), 24\u201391 (2012). https:\/\/doi.org\/10.2139\/ssrn.2002757","journal-title":"Yale J. Law Technol."},{"issue":"3","key":"41_CR16","doi-asserted-by":"publisher","first-page":"783","DOI":"10.2139\/ssrn.3966333","volume":"43","author":"Y Chen","year":"2022","unstructured":"Chen, Y.: Enforceability of anti-reverse engineering clauses in software licensing agreements: the Chinese position and lessons from the United States and European Union\u2019s laws. Univ. Pennsylvania J. Intern. Law 43(3), 783\u2013819 (2022). https:\/\/doi.org\/10.2139\/ssrn.3966333","journal-title":"Univ. Pennsylvania J. Intern. Law"},{"issue":"1","key":"41_CR17","doi-asserted-by":"publisher","first-page":"234","DOI":"10.3316\/.informit183422987692173","volume":"2005","author":"S Daniel","year":"2005","unstructured":"Daniel, S.: Reverse engineering the new reverse engineering provisions in the Copyright (Amendment) Act of 2004. Singap. J. Leg. Stud. 2005(1), 234\u2013245 (2005). https:\/\/doi.org\/10.3316\/.informit183422987692173","journal-title":"Singap. J. Leg. Stud."},{"issue":"12","key":"41_CR18","doi-asserted-by":"publisher","first-page":"123","DOI":"10.6049\/kjjbydc.2021120196","volume":"39","author":"E Zhang","year":"2022","unstructured":"Zhang, E.: How can patent protection stimulate innovation precisely: Starting from the policy lever theory in American patents. Sci. Technol. Progress Policy 39(12), 123\u2013129 (2022). https:\/\/doi.org\/10.6049\/kjjbydc.2021120196","journal-title":"Sci. Technol. Progress Policy"},{"issue":"7","key":"41_CR19","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.2307\/797533","volume":"111","author":"P Samuelson","year":"2002","unstructured":"Samuelson, P., Suzanne, S.: The law and economics of reverse engineering. Yale Law J. 111(7), 1575\u20131664 (2002). https:\/\/doi.org\/10.2307\/797533","journal-title":"Yale Law J."},{"issue":"4","key":"41_CR20","doi-asserted-by":"publisher","first-page":"652","DOI":"10.16418\/j.issn.1000-3045.2025.240022","volume":"40","author":"Y Jiang","year":"2025","unstructured":"Jiang, Y., Zhang, X., Dai, M.: Open governance and innovation directions regulation: research on institutional mechanisms for promoting development of artificial general intelligence. Bull. Chin. Acad. Sci. 40(4), 652\u2013662 (2025). https:\/\/doi.org\/10.16418\/j.issn.1000-3045.2025.240022","journal-title":"Bull. Chin. Acad. Sci."},{"issue":"1","key":"41_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2139\/ssrn.4417565","volume":"26","author":"MR Gaske","year":"2023","unstructured":"Gaske, M.R.: Regulation priorities for artificial intelligence foundation models. Vanderbilt J. Entertainment & Technol. Law 26(1), 1\u201371 (2023). https:\/\/doi.org\/10.2139\/ssrn.4417565","journal-title":"Vanderbilt J. Entertainment & Technol. Law"}],"container-title":["Lecture Notes in Computer Science","Behavioural and Social Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-7144-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T06:30:29Z","timestamp":1774247429000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-7144-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819571437","9789819571444"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-7144-4_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BESC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Behavioural and Social Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong SAR","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"besc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/besc-conf.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}