{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:56:57Z","timestamp":1742929017322,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615247"},{"type":"electronic","value":"9789819615254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1525-4_18","type":"book-chapter","created":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:28:33Z","timestamp":1739698113000},"page":"319-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Temperature-Based Watermarking and\u00a0Detection for\u00a0Large Language Models"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7228-0263","authenticated-orcid":false,"given":"Weitong","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9562-5673","authenticated-orcid":false,"given":"Zhenxin","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5823-8343","authenticated-orcid":false,"given":"Huali","family":"Ren","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9570-7566","authenticated-orcid":false,"given":"Pei-Gen","family":"Ye","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1534-3658","authenticated-orcid":false,"given":"Zhengdao","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9267-3318","authenticated-orcid":false,"given":"Shanshan","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"18_CR1","unstructured":"Bubeck, S., et\u00a0al.: Sparks of artificial general intelligence: early experiments with GPT-4. arXiv preprint arXiv:2303.12712 (2023)"},{"key":"18_CR2","unstructured":"Turing, A.M.: Computing Machinery and Intelligence. Springer (2009)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Thede, S.M., Harper, M.: A second-order hidden Markov model for part-of-speech tagging. In: Proceedings of the 37th Annual Meeting of the Association for Computational Linguistics, pp. 175\u2013182 (1999)","DOI":"10.3115\/1034678.1034712"},{"issue":"7","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1109\/29.32278","volume":"37","author":"LR Bahl","year":"1989","unstructured":"Bahl, L.R., Brown, P.F., De Souza, P.V., Mercer, R.L.: A tree-based statistical language model for natural language speech recognition. IEEE Trans. Acoust. Speech Signal Process. 37(7), 1001\u20131008 (1989)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"18_CR5","unstructured":"Brants, T., Popat, A., Xu, P., Och, F.J., Dean, J.: Large language models in machine translation. In: Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), pp. 858\u2013867 (2007)"},{"issue":"1","key":"18_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/aris.1440390108","volume":"39","author":"X Liu","year":"2005","unstructured":"Liu, X., Croft, W.B.: Statistical language modeling for information retrieval. Annu. Rev. Inf. Sci. Technol. 39(1), 1\u201331 (2005)","journal-title":"Annu. Rev. Inf. Sci. Technol."},{"key":"18_CR7","unstructured":"Mikolov, T., et\u00a0al.: Statistical language models based on neural networks. Presentation at Google, Mountain View, 2 April 2012, vol.\u00a080, no.\u00a026 (2012)"},{"key":"18_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103006","volume":"124","author":"Y Mirsky","year":"2023","unstructured":"Mirsky, Y., et al.: The threat of offensive AI to organizations. Comput. Secur. 124, 103006 (2023)","journal-title":"Comput. Secur."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Bergman, A.S., et\u00a0al.: Guiding the release of safer e2e conversational AI through value sensitive design. In: Proceedings of the 23rd Annual Meeting of the Special Interest Group on Discourse and Dialogue. Association for Computational Linguistics (2022)","DOI":"10.18653\/v1\/2022.sigdial-1.4"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Meg\u00edas, D., Kuribayashi, M., Rosales, A., Mazurczyk, W.: Dissimilar: towards fake news detection using information hiding, signal processing and machine learning. In: Proceedings of the 16th International Conference on Availability, Reliability and Security, pp. 1\u20139 (2021)","DOI":"10.1145\/3465481.3470088"},{"issue":"1","key":"18_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/3606274.3606279","volume":"25","author":"R Tang","year":"2023","unstructured":"Tang, R., Feng, Q., Liu, N., Yang, F., Hu, X.: Did you train on my dataset? Towards public dataset protection with cleanlabel backdoor watermarking. ACM SIGKDD Explor. Newsl. 25(1), 43\u201353 (2023)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"18_CR12","unstructured":"Zhao, X., Wang, Y.-X., Li, L.: Protecting language generation models via invisible watermarking. In: International Conference on Machine Learning. PMLR, pp. 42187\u201342199 (2023)"},{"issue":"8","key":"18_CR13","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/49.464718","volume":"13","author":"JT Brassil","year":"1995","unstructured":"Brassil, J.T., Low, S., Maxemchuk, N.F., O\u2019Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495\u20131504 (1995)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"110","DOI":"10.3390\/info11020110","volume":"11","author":"M Begum","year":"2020","unstructured":"Begum, M., Uddin, M.S.: Digital image watermarking techniques: a review. Information 11(2), 110 (2020)","journal-title":"Information"},{"issue":"5","key":"18_CR15","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/j.jss.2011.12.023","volume":"85","author":"LY Por","year":"2012","unstructured":"Por, L.Y., Wong, K., Chee, K.O.: UniSpaCh: a text-based data hiding method using Unicode space characters. J. Syst. Softw. 85(5), 1075\u20131082 (2012)","journal-title":"J. Syst. Softw."},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Rizzo, S.G., Bertini, F., Montesi, D.: Content-preserving text watermarking through Unicode homoglyph substitution. In: Proceedings of the 20th International Database Engineering & Applications Symposium, pp. 97\u2013104 (2016)","DOI":"10.1145\/2938503.2938510"},{"key":"18_CR17","unstructured":"Sato, R., Takezawa, Y., Bao, H., Niwa, K., Yamada, M.: Embarrassingly simple text watermarks. arXiv preprint arXiv:2310.08920 (2023)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Munyer, T., Zhong, X.: DeepTextMark: deep learning based text watermarking for detection of large language model generated text. arXiv preprint arXiv:2305.05773 (2023)","DOI":"10.1109\/ACCESS.2024.3376693"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Topkara, U., Topkara, M., Atallah, M.J.: The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 164\u2013174 (2006)","DOI":"10.1145\/1161366.1161397"},{"key":"18_CR20","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7287.001.0001","volume-title":"WordNet: An Electronic Lexical Database","author":"C Fellbaum","year":"1998","unstructured":"Fellbaum, C.: WordNet: An Electronic Lexical Database. MIT Press, Cambridge (1998)"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Yang, X., et al.: Tracing text provenance via context-aware lexical substitution. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, no.\u00a010, pp. 11613\u201311621 (2022)","DOI":"10.1609\/aaai.v36i10.21415"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Yoo, K., Ahn, W., Jang, J., Kwak, N.: Robust multi-bit natural language watermarking through invariant features. In: Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 2092\u20132115 (2023)","DOI":"10.18653\/v1\/2023.acl-long.117"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Topkara, M., Topkara, U., Atallah, M.J.: Words are not enough: sentence level natural language watermarking. In: Proceedings of the 4th ACM International Workshop on Contents Protection and Security, pp. 37\u201346 (2006)","DOI":"10.1145\/1178766.1178777"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Abdelnabi, S., Fritz, M.: Adversarial watermarking transformer: towards tracing text provenance with data hiding. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 121\u2013140. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00083"},{"key":"18_CR25","unstructured":"Zhang, R., Hussain, S.S., Neekhara, P., Koushanfar, F.: Remark-LLM: a robust and efficient watermarking framework for generative large language models. arXiv preprint arXiv:2310.12362 (2023)"},{"key":"18_CR26","unstructured":"Jang, E., Gu, S., Poole, B.: Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144 (2016)"},{"key":"18_CR27","unstructured":"Liu, Y., Hu, H., Zhang, X., Sun, L.: Watermarking text data on large language models for dataset copyright protection. arXiv preprint arXiv:2305.13257 (2023)"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Sun, Z., Du, X., Song, F., Ni, M., Li, L.: CoProtector: protect open-source code against unauthorized training usage with data poisoning. In: Proceedings of the ACM Web Conference 2022, pp. 652\u2013660 (2022)","DOI":"10.1145\/3485447.3512225"},{"key":"18_CR29","unstructured":"Kirchenbauer, J., Geiping, J., Wen, Y., Katz, J., Miers, I., Goldstein, T.: A watermark for large language models. In: International Conference on Machine Learning. PMLR, pp. 17061\u201317084 (2023)"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Iqbal, M.M., Khadam, U., Han, K.J., Han, J., Jabbar, S.: A robust digital watermarking algorithm for text document copyright protection based on feature coding. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1940\u20131945. IEEE (2019)","DOI":"10.1109\/IWCMC.2019.8766644"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1525-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:28:58Z","timestamp":1739698138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1525-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615247","9789819615254"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1525-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}