{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T05:47:25Z","timestamp":1766382445012,"version":"build-2065373602"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602241"],"award-info":[{"award-number":["61602241"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-NSFOCUS Kun-Peng Scientific Research Fund","award":["CCF-NSFOCUS 2021012"],"award-info":[{"award-number":["CCF-NSFOCUS 2021012"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s10489-022-03926-1","type":"journal-article","created":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T13:21:27Z","timestamp":1658150487000},"page":"7298-7309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples"],"prefix":"10.1007","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2408-503X","authenticated-orcid":false,"given":"Mingfu","family":"Xue","sequence":"first","affiliation":[]},{"given":"Yinghao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weiqiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"3926_CR1","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: IEEE Conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"2","key":"3926_CR2","first-page":"1","volume":"5","author":"D Banesh","year":"2021","unstructured":"Banesh D, Petersen MR, Ahrens J, Turton TL, Samsel F, Schoonover J, Hamann B (2021) An image-based framework for ocean feature detection and analysis. J Geovisualization Spat Anal 5 (2):1\u201321","journal-title":"J Geovisualization Spat Anal"},{"key":"3926_CR3","unstructured":"Xue M, Zhang Y, Wang J, Liu W (2021) Intellectual property protection for deep learning models: taxonomy, methods, attacks, and evaluations. IEEE Trans Artif Intell:1\u201316"},{"issue":"1","key":"3926_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41651-019-0044-z","volume":"4","author":"P Du","year":"2020","unstructured":"Du P, Bai X, Tan K, Xue Z, Samat A, Xia J, Li E, Su H, Liu W (2020) Advances of four machine learning methods for spatial data handling: a review. J Geovisualization Spat Anal 4(1):1\u201325","journal-title":"J Geovisualization Spat Anal"},{"key":"3926_CR5","unstructured":"Adi Y, Baum C, Ciss\u00e9 M, Pinkas B, Keshet J (2018) Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX security symposium, pp 1615\u20131631"},{"key":"3926_CR6","doi-asserted-by":"crossref","unstructured":"Uchida Y, Nagai Y, Sakazawa S, Satoh S (2017) Embedding watermarks into deep neural networks. In: Proceedings of the ACM international conference on multimedia retrieval, pp 269\u2013277","DOI":"10.1145\/3078971.3078974"},{"key":"3926_CR7","doi-asserted-by":"crossref","unstructured":"Zhang J, Gu Z, Jang J, Wu H, Stoecklin MP, Huang H, Molloy IM (2018) Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the Asia conference on computer and communications security, pp 159\u2013172","DOI":"10.1145\/3196494.3196550"},{"key":"3926_CR8","doi-asserted-by":"crossref","unstructured":"Ribeiro M, Grolinger K, Capretz MAM (2015) MLaaS: machine learning as a service. In: Proceedings of the 14th IEEE international conference on machine learning and applications, pp 896\u2013902","DOI":"10.1109\/ICMLA.2015.152"},{"key":"3926_CR9","doi-asserted-by":"crossref","unstructured":"Inkawhich N, Wen W, Li HH, Chen Y (2019) Feature space perturbations yield more transferable adversarial examples. In: IEEE conference on computer vision and pattern recognition, pp 7066\u20137074","DOI":"10.1109\/CVPR.2019.00723"},{"issue":"8","key":"3926_CR10","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TMM.2016.2569497","volume":"18","author":"W Zhang","year":"2016","unstructured":"Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans Multimed 18(8):1469\u20131479","journal-title":"IEEE Trans Multimed"},{"key":"3926_CR11","unstructured":"Krizhevsky A, Hinton G (2009) Learning multiple layers of features from tiny images. Technical report, University of Toronto"},{"key":"3926_CR12","unstructured":"Karpathy A (2016) Tiny imagenet challenge. Technical report, Stanford University"},{"key":"3926_CR13","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd international conference on learning representations, pp 1\u201314"},{"key":"3926_CR14","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, van der Maaten L, Weinberger KQ (2017) Densely connected convolutional networks. In: IEEE Conference on computer vision and pattern recognition, pp 2261\u20132269","DOI":"10.1109\/CVPR.2017.243"},{"key":"3926_CR15","unstructured":"Guo J, Potkonjak M (2019) Evolutionary trigger set generation for DNN black-box watermarking. arXiv:1906.04411"},{"key":"3926_CR16","doi-asserted-by":"crossref","unstructured":"Zhong Q, Zhang LY, Zhang J, Gao L, Xiang Y (2020) Protecting IP of deep neural networks with watermarking: a new label helps. In: Pacific-Asia advances in knowledge discovery and data mining, vol 12085, pp 462\u2013474","DOI":"10.1007\/978-3-030-47436-2_35"},{"key":"3926_CR17","doi-asserted-by":"crossref","unstructured":"Szyller S, Atli BG, Marchal S, Asokan N (2021) DAWN: dynamic adversarial watermarking of neural networks. In: ACM multimedia conference, pp 4417\u20134425","DOI":"10.1145\/3474085.3475591"},{"key":"3926_CR18","unstructured":"Jia H, Choquette-Choo CA, Chandrasekaran V, Papernot N (2021) Entangled watermarks as a defense against model extraction. In: 30th USENIX security symposium, pp 1937\u20131954"},{"key":"3926_CR19","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.comcom.2019.12.016","volume":"150","author":"J Zhao","year":"2020","unstructured":"Zhao J, Hu Q, Liu G, Ma X, Chen F, Hassan MM (2020) AFA: Adversarial fingerprinting authentication for deep neural networks. Comput Commun 150:488\u2013497","journal-title":"Comput Commun"},{"key":"3926_CR20","doi-asserted-by":"crossref","unstructured":"Chen M, Wu M (2018) Protect your deep neural networks from piracy. In: IEEE international workshop on information forensics and security, pp 1\u20137","DOI":"10.1109\/WIFS.2018.8630791"},{"key":"3926_CR21","unstructured":"Fan L, Ng K, Chan CS (2019) Rethinking deep neural network ownership verification: embedding passports to defeat ambiguity attacks. In: Annual conference on neural information processing systems, pp 4716\u20134725"},{"issue":"7","key":"3926_CR22","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/TCAD.2020.3018403","volume":"40","author":"N Lin","year":"2021","unstructured":"Lin N, Chen X, Lu H, Li X (2021) Chaotic weights: a novel approach to protect intellectual property of deep neural networks. IEEE Trans Comput Aided Des Integr Circ Syst 40(7):1327\u20131339","journal-title":"IEEE Trans Comput Aided Des Integr Circ Syst"},{"key":"3926_CR23","doi-asserted-by":"crossref","unstructured":"Xue M, Wu Z, He C, Wang J, Liu W (2020) Active DNN IP protection: a novel user fingerprint management and DNN authorization control technique. In: 19th IEEE international conference on trust, security and privacy in computing and communications, pp 975\u2013982","DOI":"10.1109\/TrustCom50675.2020.00130"},{"issue":"3","key":"3926_CR24","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.1109\/TDSC.2020.3028448","volume":"19","author":"M Xue","year":"2022","unstructured":"Xue M, He C, Wang J, Liu W (2022) One-to-N & N-to-One: two advanced backdoor attacks against deep learning models. IEEE Trans Dependable Secure Comput 19(3):1562\u20131578","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"3926_CR25","doi-asserted-by":"crossref","unstructured":"Zhang J, Chen D, Liao J, Fang H, Zhang W, Zhou W, Cui H, Yu N (2020) Model watermarking for image processing networks. In: Proceedings of the AAAI conference on artificial intelligence, pp 12805\u201312812","DOI":"10.1609\/aaai.v34i07.6976"},{"issue":"7","key":"3926_CR26","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/TCSVT.2020.3030671","volume":"31","author":"H Wu","year":"2021","unstructured":"Wu H, Liu G, Yao Y, Zhang X (2021) Watermarking neural networks with watermarked images. IEEE Trans Circ Syst Video Technol 31(7):2591\u20132601","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"2","key":"3926_CR27","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable reversible. IEEE Trans Inf Forensic Secur 7(2):826\u2013832","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"3926_CR28","unstructured":"David R (2020) LSB-Steganography. https:\/\/github.com\/robindavid\/LSB-steganography. Accessed 10 Sep 2021"},{"key":"3926_CR29","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: IEEE conference on computer vision and pattern recognition, pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"3926_CR30","unstructured":"Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks?. In: Annual conference on neural information processing systems, pp 3320\u20133328"},{"key":"3926_CR31","unstructured":"Dworkin M, Barker E, Nechvatal J, Foti J, Bassham L, Roback E, Dray J (2001) Advanced encryption standard (AES). Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg MD"},{"key":"3926_CR32","unstructured":"Kingma DP, Ba J (2015) Adam: a method for stochastic optimization. In: 3rd international conference on learning representations, pp 1\u201315"},{"issue":"4","key":"3926_CR33","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03926-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03926-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03926-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T04:43:55Z","timestamp":1677473035000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03926-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["3926"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03926-1","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"23 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}