{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:06:57Z","timestamp":1775326017268,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681822","type":"print"},{"value":"9789819681839","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8183-9_7","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T17:38:19Z","timestamp":1750354699000},"page":"78-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MarkErase: Defeating Entangled Watermarks in\u00a0Model Extraction Attacks"],"prefix":"10.1007","author":[{"given":"Teng","family":"Fei","sequence":"first","affiliation":[]},{"given":"Xinjing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yanjun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haizhuan","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Leo Yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"7_CR1","unstructured":"Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: USENIX Security, pp. 1615\u20131631 (2018)"},{"key":"7_CR2","unstructured":"Duddu, V., Samanta, D., Rao, D.V., Balas, V.E.: Stealing neural networks via timing side channels. arXiv abs\/1812.11720 (2018)"},{"key":"7_CR3","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: Badnets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"7_CR5","unstructured":"Hinton, G.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)"},{"key":"7_CR6","unstructured":"Jia, H., Choquette-Choo, C.A., Chandrasekaran, V., et\u00a0al.: Entangled watermarks as a defense against model extraction. In: USENIX Security, pp. 1937\u20131954 (2021)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Juuti, M., Szyller, S., Marchal, S., Asokan, N.: Prada: protecting against DNN model stealing attacks. In: EuroS &P, pp. 512\u2013527. IEEE (2019)","DOI":"10.1109\/EuroSP.2019.00044"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Kariyappa, S., Prakash, A., Qureshi, M.K.: Maze: data-free model stealing attack using zeroth-order gradient estimation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13814\u201313823 (2021)","DOI":"10.1109\/CVPR46437.2021.01360"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Li, M., Zhong, Q., Zhang, L.Y., Du, Y., Zhang, J., Xiang, Y.: Protecting the intellectual property of deep neural networks with watermarking: the frequency domain approach. In: TrustCom, pp. 402\u2013409 (2020)","DOI":"10.1109\/TrustCom50675.2020.00062"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Liu, K., Dolan-Gavitt, B., Garg, S.: Fine-pruning: defending against backdooring attacks on deep neural networks. In: RAID, pp. 273\u2013294. Springer, Cham (2018)","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Lv, P., Ma, H., Chen, K., Zhou, J., Zhang, S., et\u00a0al.: Mea-defender: a robust watermark against model extraction attack. arXiv preprint arXiv:2401.15239 (2024)","DOI":"10.1109\/SP54263.2024.00099"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M.: Knockoff nets: stealing functionality of black-box models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4954\u20134963 (2019)","DOI":"10.1109\/CVPR.2019.00509"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Pal, S., Gupta, Y., Shukla, A., Kanade, A., Shevade, S., Ganapathy, V.: Activethief: model extraction using active learning and unannotated public data. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 865\u2013872 (2020)","DOI":"10.1609\/aaai.v34i01.5432"},{"key":"7_CR14","unstructured":"Szegedy, C.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"7_CR15","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction $$\\{$$APIs$$\\}$$. In: USENIX Security, pp. 601\u2013618 (2016)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Wang, B., Yao, Y., Shan, S., et\u00a0al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: SP, pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"7_CR17","unstructured":"Wenger, E., Bhattacharjee, R., Bhagoji, A.N., Passananti, J., Andere, E., et\u00a0al.: Natural backdoor datasets. arXiv preprint arXiv:2206.10673 (2022)"},{"key":"7_CR18","unstructured":"Wu, D., Wang, Y.: Adversarial neuron pruning purifies backdoored deep models. In: Advances in Neural Information Processing Systems, vol. 34, pp. 16913\u201316925 (2021)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Zhao, X., Yao, Y., Wu, H., Zhang, X.: Structural watermarking to deep neural networks via network channel pruning. In: 2021 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/WIFS53200.2021.9648376"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, R., Tang, R., Li, J., Liu, L.: Data-free backdoor removal based on channel lipschitzness. In: ECCV, pp. 175\u2013191. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-20065-6_11"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Zhong, Q., Zhang, L.Y., Hu, S., et\u00a0al.: Attention distraction: watermark removal through continual learning with selective forgetting. In: 2022 IEEE International Conference on Multimedia and Expo (ICME), pp.\u00a01\u20136. IEEE (2022)","DOI":"10.1109\/ICME52920.2022.9858930"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8183-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T17:38:25Z","timestamp":1750354705000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8183-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681822","9789819681839"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8183-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}