{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T12:14:07Z","timestamp":1772799247928,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072063"],"award-info":[{"award-number":["62072063"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R &D Program of China","doi-asserted-by":"crossref","award":["2020YFB1805401"],"award-info":[{"award-number":["2020YFB1805401"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10489-023-04797-w","type":"journal-article","created":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T13:01:37Z","timestamp":1689598897000},"page":"24056-24067","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Convolutional neural networks tamper detection and location based on fragile watermarking"],"prefix":"10.1007","volume":"53","author":[{"given":"Yawen","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8872-9995","authenticated-orcid":false,"given":"Hongying","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Di","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"4797_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Badnets: Evaluating backdooring attacks on deep neural networks. IEEE Access 6:14410\u201314430","journal-title":"IEEE Access"},{"issue":"5","key":"4797_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MIS.2005.88","volume":"20","author":"H Chen","year":"2005","unstructured":"Chen H, Wang F-Y (2005) Guest editors\u2019 introduction: Artificial intelligence for homeland security. IEEE Intell Syst 20(5):12\u201316","journal-title":"IEEE Intell Syst"},{"key":"4797_CR3","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"Tianyu Gu","year":"2019","unstructured":"Gu Tianyu, Liu Kang, Dolan-Gavitt Brendan, Garg Siddharth (2019) Badnets: Evaluating backdooring attacks on deep neural networks. IEEE Access 7:47230\u201347244","journal-title":"IEEE Access"},{"key":"4797_CR4","doi-asserted-by":"crossref","unstructured":"Uchida, Y, Nagai, Y, Sakazawa, S, Satoh, S (2017) Embedding water-marks into deep neural networks. In: Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, pp. 269\u2013277","DOI":"10.1145\/3078971.3078974"},{"issue":"1","key":"4797_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s13735-018-0147-1","volume":"7","author":"Y Nagai","year":"2018","unstructured":"Nagai Y, Uchida Y, Sakazawa S, Satoh S (2018) Digital watermarking for deep neural networks. Int J Multimed Inf Retr 7(1):3\u201316","journal-title":"Int J Multimed Inf Retr"},{"key":"4797_CR6","doi-asserted-by":"crossref","unstructured":"Darvish Rouhani, B, Chen, H, Koushanfar, F (2019) Deepsigns: An end-to-end watermarking framework for ownership protection of deep neural networks. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 485\u2013497","DOI":"10.1145\/3297858.3304051"},{"key":"4797_CR7","first-page":"993","volume":"2021","author":"T Wang","year":"2021","unstructured":"Wang T, Kerschbaum F (2021) Riga: Covert and robust white-box water-marking of deep neural networks. Proceedings of the Web Conference 2021:993\u20131004","journal-title":"Proceedings of the Web Conference"},{"key":"4797_CR8","doi-asserted-by":"crossref","unstructured":"Chen, H, Rouhani, BD, Fu, C, Zhao, J, Koushanfar, F (2019) Deepmarks: A secure fingerprinting framework for digital rights management of deep learning models. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval, pp. 105\u2013113","DOI":"10.1145\/3323873.3325042"},{"key":"4797_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1017\/ATSIP.2021.9","volume":"10","author":"A MaungMaung","year":"2021","unstructured":"MaungMaung A, Kiya H (2021) A protection method of trained cnn model with a secret key from unauthorized access. APSIPA Transactions on Signal and Information Processing 10:10","journal-title":"APSIPA Transactions on Signal and Information Processing"},{"key":"4797_CR10","unstructured":"Adi, Y, Baum, C, Cisse, M, Pinkas, B, Keshet, J (2018) Turning your weakness into a strength: Watermarking deep neural networks by back-dooring. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1615\u20131631"},{"issue":"13","key":"4797_CR11","doi-asserted-by":"publisher","first-page":"9233","DOI":"10.1007\/s00521-019-04434-z","volume":"32","author":"E Le Merrer","year":"2020","unstructured":"Le Merrer E, Perez P, Tr\u00e9dan G (2020) Adversarial frontier stitching for remote neural network watermarking. Neural Comput Appl 32(13):9233\u20139244","journal-title":"Neural Comput Appl"},{"key":"4797_CR12","doi-asserted-by":"crossref","unstructured":"Li, Z, Hu, C, Zhang, Y, Guo, S (2019) How to prove your model belongs to you: A blind-watermark based framework to protect intellectual prop-erty of dnn. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 126\u2013137","DOI":"10.1145\/3359789.3359801"},{"issue":"5","key":"4797_CR13","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TNNLS.2020.2991378","volume":"32","author":"Y Quan","year":"2020","unstructured":"Quan Y, Teng H, Chen Y, Ji H (2020) Watermarking deep neural networks in image processing. IEEE Trans Neural Netw Learn Syst 32(5):1852\u20131865","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"7","key":"4797_CR14","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/TCSVT.2020.3030671","volume":"31","author":"H Wu","year":"2020","unstructured":"Wu H, Liu G, Yao Y, Zhang X (2020) Watermarking neural networks with watermarked images. IEEE Trans Circuits Syst Video Technol 31(7):2591\u20132601","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4797_CR15","first-page":"22","volume":"4","author":"J Wang","year":"2020","unstructured":"Wang J, Wu H, Zhang X (2020) Yao, Y (2020) Watermarking in deep neural networks via error back-propagation. Electron Imaging 4:22\u20131229","journal-title":"Electron Imaging"},{"key":"4797_CR16","doi-asserted-by":"crossref","unstructured":"Zhao, X,Wu, H, Zhang, X (2021) Watermarking graph neural networks by ran-dom graphs. In: 2021 9th International Symposium on Digital Forensics and Security (ISDFS), pp. 1\u20136 IEEE","DOI":"10.1109\/ISDFS52919.2021.9486352"},{"key":"4797_CR17","doi-asserted-by":"crossref","unstructured":"He, Zecheng and Zhang, Tianwei and Lee, Ruby (2019) Sensitive-sample fin-gerprinting of deep neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4729\u20134737","DOI":"10.1109\/CVPR.2019.00486"},{"key":"4797_CR18","doi-asserted-by":"crossref","unstructured":"Szentannai, K\u00e1lm\u00e1n and Al-Afandi, Jalal and Horv\u00e1th, Andr\u00e1s (2020) Pre-venting Neural Network Weight Stealing via Network Obfuscation. In: Intelligent Computing: Proceedings of the 2020 Computing Conference,Volume 3, pp. 1\u201311 Springer","DOI":"10.1007\/978-3-030-52243-8_1"},{"key":"4797_CR19","doi-asserted-by":"crossref","unstructured":"Guan, X, Feng, H, Zhang, W, Zhou, H, Zhang, J, Yu, N (2020) Reversible watermarking in deep convolutional neural networks for integrity authen-tication. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 2273\u20132280","DOI":"10.1145\/3394171.3413729"},{"key":"4797_CR20","doi-asserted-by":"crossref","unstructured":"Abuadbba, A, Kim, H, Nepal, S (2021) Deepisign: invisible fragile water-mark to protect the integrity and authenticity of cnn. In: Proceedings of the 36th Annual ACM Symposium on Applied Computing, pp. 952\u2013959","DOI":"10.1145\/3412841.3441970"},{"key":"4797_CR21","doi-asserted-by":"crossref","unstructured":"Zhu, R, Wei, P, Li, S, Yin, Z, Zhang, X, Qian, Z (2021) Fragile neural net-work watermarking with trigger image set. In: International Conference on Knowledge Science, Engineering and Management, pp. 280\u2013293 Springer","DOI":"10.1007\/978-3-030-82136-4_23"},{"key":"4797_CR22","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ins.2021.06.073","volume":"576","author":"M Botta","year":"2021","unstructured":"Botta M, Cavagnino D, Esposito R (2021) Neunac: A novel fragile water-marking algorithm for integrity protection of neural networks. Inf Sci 576:228\u2013241","journal-title":"Inf Sci"},{"key":"4797_CR23","doi-asserted-by":"crossref","unstructured":"Aramoon, O, Chen, P-Y, Qu, G (2021) Aid: Attesting the integrity of deep neural networks. In: 2021 58th ACM\/IEEE Design Automation Conference (DAC), pp. 19\u201324 IEEE","DOI":"10.1109\/DAC18074.2021.9586290"},{"key":"4797_CR24","doi-asserted-by":"crossref","unstructured":"Merkle, R C (1987) A digital signature based on a conventional encryption func-tion. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 369\u2013378 Springer","DOI":"10.1007\/3-540-48184-2_32"},{"key":"4797_CR25","doi-asserted-by":"crossref","unstructured":"Fu, J, Zhang, W, Yu, N, Ma, G, Tang, Q (2014) Fast tamper location of batch dna sequences based on reversible data hiding. In: 2014 7th International Conference on Biomedical Engineering and Informatics, pp. 868\u2013872 IEEE","DOI":"10.1109\/BMEI.2014.7002894"},{"key":"4797_CR26","doi-asserted-by":"crossref","unstructured":"Lin, M, Ji, R, Wang, Y, Zhang, Y, Zhang, B, Tian, Y, Shao, L (2020) Hrank: Filter pruning using high-rank feature map. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1529\u20131538","DOI":"10.1109\/CVPR42600.2020.00160"},{"key":"4797_CR27","doi-asserted-by":"crossref","unstructured":"Kalker, T, Willems, FM (2002) Capacity bounds and constructions for reversible data-hiding. In: 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No. 02TH8628), vol. 1, pp. 71\u201376 IEEE","DOI":"10.1109\/ICDSP.2002.1027818"},{"issue":"3","key":"4797_CR28","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4797_CR29","doi-asserted-by":"crossref","unstructured":"Lawnik, M (2018) Combined logistic and tent map. In: Journal of Physics: Conference Series, vol. 1141, p. 012132 IOP Publishing","DOI":"10.1088\/1742-6596\/1141\/1\/012132"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-04797-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-023-04797-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-04797-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T08:34:19Z","timestamp":1729758859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-023-04797-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":29,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["4797"],"URL":"https:\/\/doi.org\/10.1007\/s10489-023-04797-w","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"14 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}