{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T16:05:40Z","timestamp":1771344340025,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["No. 2024YFE0211000"],"award-info":[{"award-number":["No. 2024YFE0211000"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 62372329"],"award-info":[{"award-number":["No. 62372329"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Scientific Innovation Foundation","award":["No. 23DZ1203400"],"award-info":[{"award-number":["No. 23DZ1203400"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["No. GZB20250385, 2025M771539"],"award-info":[{"award-number":["No. GZB20250385, 2025M771539"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tongji-Qomolo Autonomous Driving Commercial Vehicle Joint Lab Project"},{"name":"Xiaomi Young Talents Program"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s11263-025-02619-9","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T05:27:33Z","timestamp":1768195653000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic MAsk-Pruning Strategy for Source-Free Model Intellectual Property Protection"],"prefix":"10.1007","volume":"134","author":[{"given":"Boyang","family":"Peng","sequence":"first","affiliation":[]},{"given":"Sanqing","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tianpei","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Lianghua","family":"He","sequence":"additional","affiliation":[]},{"given":"Alois","family":"Knoll","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7416-592X","authenticated-orcid":false,"given":"Guang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Changjun","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"key":"2619_CR1","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In: CVPR.","DOI":"10.1109\/CVPR.2016.90"},{"key":"2619_CR2","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., et al. (2021). An image is worth 16x16 words: Transformers for image recognition at scale. In: ICLR."},{"key":"2619_CR3","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., & Fei-Fei, L. (2009). Imagenet: A large-scale hierarchical image database. In: CVPR.","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"2619_CR4","doi-asserted-by":"crossref","unstructured":"Kirillov, A., Mintun, E., Ravi, N., Mao, H., Rolland, C., Gustafson, L., Xiao, T., Whitehead, S., Berg, A.C., Lo, W.-Y., et al. (2023). Segment anything. In: ICCV.","DOI":"10.1109\/ICCV51070.2023.00371"},{"key":"2619_CR5","unstructured":"Zoph, B., & Le, Q.V. (2016). Neural architecture search with reinforcement learning. In: ICLR."},{"key":"2619_CR6","doi-asserted-by":"crossref","unstructured":"Li, P., Cheng, P., Li, F., Du, W., Zhao, H., & Liu, G. (2023). Plmmark: a secure and robust black-box watermarking framework for pre-trained language models. In: AAAI.","DOI":"10.1609\/aaai.v37i12.26750"},{"key":"2619_CR7","doi-asserted-by":"crossref","unstructured":"Charette, L., Chu, L., Chen, Y., Pei, J., Wang, L., & Zhang, Y. (2022). Cosine model watermarking against ensemble distillation. In: AAAI.","DOI":"10.1609\/aaai.v36i9.21184"},{"key":"2619_CR8","doi-asserted-by":"crossref","unstructured":"Vybornova, Y., & Ulyanov, D. (2022). Method for protection of deep learning models using digital watermarking. In: 2022 VIII International Conference on Information Technology and Nanotechnology (ITNT), pp. 1\u20135. IEEE","DOI":"10.1109\/ITNT55410.2022.9848658"},{"key":"2619_CR9","doi-asserted-by":"crossref","unstructured":"Peng, Z., Li, S., Chen, G., Zhang, C., Zhu, H., & Xue, M. (2022). Fingerprinting deep neural networks globally via universal adversarial perturbations. In: CVPR.","DOI":"10.1109\/CVPR52688.2022.01307"},{"key":"2619_CR10","unstructured":"Guan, J., Liang, J., & He, R. (2022). Are you stealing my model? sample correlation for fingerprinting deep neural networks. NeurIPS."},{"key":"2619_CR11","unstructured":"Wang, L., Xu, S., Xu, R., Wang, X., & Zhu, Q. (2021). Non-transferable learning: A new approach for model ownership verification and applicability authorization. arXiv preprint arXiv:2106.06916"},{"key":"2619_CR12","doi-asserted-by":"crossref","unstructured":"Wang, L., Wang, M., Zhang, D., & Fu, H. (2023). Model barrier: A compact un-transferable isolation domain for model intellectual property protection. In: CVPR.","DOI":"10.1109\/CVPR52729.2023.01961"},{"key":"2619_CR13","doi-asserted-by":"crossref","unstructured":"Peng, B., Qu, S., Wu, Y., Zou, T., He, L., Knoll, A., Chen, G., & Jiang, C. (2024). Map: Mask-pruning for source-free model intellectual property protection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 23585\u201323594.","DOI":"10.1109\/CVPR52733.2024.02226"},{"key":"2619_CR14","unstructured":"Frankle, J., & Carbin, M. (2018). The lottery ticket hypothesis: Finding sparse, trainable neural networks. arXiv preprint arXiv:1803.03635"},{"key":"2619_CR15","doi-asserted-by":"crossref","unstructured":"Carlini, N., Chien, S., Nasr, M., Song, S., Terzis, A., & Tramer, F. (2022). Membership inference attacks from first principles. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1897\u20131914. IEEE","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"2619_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhao, Z., Backes, M., & Zhang, Y. (2022). Membership inference attacks by exploiting loss trajectory. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2085\u20132098","DOI":"10.1145\/3548606.3560684"},{"key":"2619_CR17","doi-asserted-by":"crossref","unstructured":"Ye, J., Maddi, A., Murakonda, S.K., Bindschaedler, V., & Shokri, R. (2022). Enhanced membership inference attacks against machine learning models. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 3093\u20133106.","DOI":"10.1145\/3548606.3560675"},{"key":"2619_CR18","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., & Ristenpart, T. (2015). Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322\u20131333.","DOI":"10.1145\/2810103.2813677"},{"key":"2619_CR19","unstructured":"Zhang, Z., Liu, Q., Huang, Z., Wang, H., Lee, C.-K., & Chen, E. (2022). Model inversion attacks against graph neural networks. IEEE TKDE"},{"key":"2619_CR20","unstructured":"Struppek, L., Hintersdorf, D., Correia, A.D.A., Adler, A., & Kersting, K. (2022). Plug & play attacks: Towards robust and flexible model inversion attacks. arXiv preprint arXiv:2201.12179"},{"key":"2619_CR21","doi-asserted-by":"crossref","unstructured":"Luo, B., Liu, Y., Wei, L., & Xu, Q. (2018). Towards imperceptible and robust adversarial example attacks against neural networks. In: AAAI","DOI":"10.1609\/aaai.v32i1.11499"},{"key":"2619_CR22","doi-asserted-by":"crossref","unstructured":"Yuan, C., Liu, X., & Zhang, Z. (2021). The current status and progress of adversarial examples attacks. In: 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), pp. 707\u2013711. IEEE","DOI":"10.1109\/CISCE52179.2021.9445917"},{"key":"2619_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M.P., Huang, H., & Molloy, I. (2018). Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 159\u2013172","DOI":"10.1145\/3196494.3196550"},{"key":"2619_CR24","doi-asserted-by":"crossref","unstructured":"Li, Z., Hu, C., Zhang, Y., & Guo, S. (2019). How to prove your model belongs to you: A blind-watermark based framework to protect intellectual property of dnn. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 126\u2013137.","DOI":"10.1145\/3359789.3359801"},{"key":"2619_CR25","doi-asserted-by":"crossref","unstructured":"Guo, S., Zhang, T., Qiu, H., Zeng, Y., Xiang, T., & Liu, Y. (2020). Fine-tuning is not enough: A simple yet effective watermark removal attack for dnn models. arXiv preprint arXiv:2009.08697","DOI":"10.24963\/ijcai.2021\/500"},{"key":"2619_CR26","doi-asserted-by":"crossref","unstructured":"Chen, X., Wang, W., Bender, C., Ding, Y., Jia, R., Li, B., & Song, D. (2021). Refit: a unified watermark removal framework for deep learning systems with limited data. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, pp. 321\u2013335.","DOI":"10.1145\/3433210.3453079"},{"key":"2619_CR27","doi-asserted-by":"crossref","unstructured":"Wang, H., Chi, H., Yang, W., Lin, Z., Geng, M., Lan, L., Zhang, J., & Tao, D. (2023). Domain specified optimization for deployment authorization. In: ICCV, pp. 5095\u20135105","DOI":"10.1109\/ICCV51070.2023.00470"},{"key":"2619_CR28","unstructured":"He, Y., & Xiao, L. (2023). Structured pruning for deep convolutional neural networks: A survey. arXiv preprint arXiv:2303.00566"},{"key":"2619_CR29","doi-asserted-by":"crossref","unstructured":"Wimmer, P., Mehnert, J., & Condurache, A. (2022). Interspace pruning: Using adaptive filter representations to improve training of sparse cnns. In: CVPR.","DOI":"10.1109\/CVPR52688.2022.01220"},{"key":"2619_CR30","doi-asserted-by":"crossref","unstructured":"Mallya, A., Davis, D., & Lazebnik, S. (2018). Piggyback: Adapting a single network to multiple tasks by learning to mask weights. In: ECCV.","DOI":"10.1007\/978-3-030-01225-0_5"},{"key":"2619_CR31","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.neucom.2018.05.083","volume":"312","author":"M Wang","year":"2018","unstructured":"Wang, M., & Deng, W. (2018). Deep visual domain adaptation: A survey. Neurocomputing, 312, 135\u2013153.","journal-title":"Neurocomputing"},{"key":"2619_CR32","unstructured":"Liang, J., He, R., & Tan, T. (2023). A comprehensive survey on test-time adaptation under distribution shifts. arXiv preprint arXiv:2303.15361"},{"key":"2619_CR33","doi-asserted-by":"crossref","unstructured":"Chidlovskii, B., Clinchant, S., & Csurka, G. (2016). Domain adaptation in the absence of source domain data. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 451\u2013460","DOI":"10.1145\/2939672.2939716"},{"key":"2619_CR34","doi-asserted-by":"crossref","unstructured":"Clinchant, S., Chidlovskii, B., & Csurka, G. (2016). Transductive adaptation of black box predictions. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pp. 326\u2013331","DOI":"10.18653\/v1\/P16-2053"},{"key":"2619_CR35","unstructured":"Laarhoven, T., & Marchiori, E. (2017). Unsupervised domain adaptation with random walks on target labelings. arXiv preprint arXiv:1706.05335"},{"key":"2619_CR36","unstructured":"Liang, J., Hu, D., & Feng, J. (2020). Do we really need to access the source data? source hypothesis transfer for unsupervised domain adaptation. In: ICML. PMLR"},{"key":"2619_CR37","unstructured":"Liu, Y., Kothari, P., Van\u00a0Delft, B., Bellot-Gurlet, B., Mordan, T., & Alahi, A. (2021). Ttt++: When does self-supervised test-time training fail or thrive? NeurIPS"},{"key":"2619_CR38","doi-asserted-by":"crossref","unstructured":"Li, R., Jiao, Q., Cao, W., Wong, H.-S., & Wu, S. (2020). Model adaptation: Unsupervised domain adaptation without source data. In: CVPR","DOI":"10.1109\/CVPR42600.2020.00966"},{"key":"2619_CR39","doi-asserted-by":"crossref","unstructured":"Qiu, Z., Zhang, Y., Lin, H., Niu, S., Liu, Y., Du, Q., & Tan, M. (2021). Source-free domain adaptation via avatar prototype generation and adaptation. arXiv preprint arXiv:2106.15326","DOI":"10.24963\/ijcai.2021\/402"},{"key":"2619_CR40","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhang, W., & Wang, J. (2021). Source-free domain adaptation for semantic segmentation. In: CVPR.","DOI":"10.1109\/CVPR46437.2021.00127"},{"issue":"11","key":"2619_CR41","first-page":"8602","volume":"44","author":"J Liang","year":"2021","unstructured":"Liang, J., Hu, D., Wang, Y., He, R., & Feng, J. (2021). Source data-absent unsupervised domain adaptation through hypothesis transfer and labeling transfer. IEEE TPAMI, 44(11), 8602\u20138617.","journal-title":"IEEE TPAMI"},{"key":"2619_CR42","doi-asserted-by":"crossref","unstructured":"Qu, S., Chen, G., Zhang, J., Li, Z., He, W., & Tao, D. (2022). Bmd: A general class-balanced multicentric dynamic prototype strategy for source-free domain adaptation. In: ECCV.","DOI":"10.1007\/978-3-031-19830-4_10"},{"key":"2619_CR43","doi-asserted-by":"crossref","unstructured":"Qu, S., Zou, T., R\u00f6hrbein, F., Lu, C., Chen, G., Tao, D., & Jiang, C. (2023). Upcycling models under domain and category shift. In: CVPR.","DOI":"10.1109\/CVPR52729.2023.01917"},{"key":"2619_CR44","unstructured":"Tishby, N., Pereira, F.C., & Bialek, W. (2000). The information bottleneck method. arXiv preprint physics\/0004057"},{"issue":"2","key":"2619_CR45","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s00138-023-01379-1","volume":"34","author":"T Schlagenhauf","year":"2023","unstructured":"Schlagenhauf, T., Lin, Y., & Noack, B. (2023). Discriminative feature learning through feature distance loss. Machine Vision and Applications, 34(2), 25.","journal-title":"Machine Vision and Applications"},{"key":"2619_CR46","doi-asserted-by":"crossref","unstructured":"Chen, H., Wang, Y., Xu, C., Yang, Z., Liu, C., Shi, B., Xu, C., Xu, C., & Tian, Q. (2019). Data-free learning of student networks. In: ICCV.","DOI":"10.1109\/ICCV.2019.00361"},{"key":"2619_CR47","doi-asserted-by":"crossref","unstructured":"Wang, Z., Luo, Y., Qiu, R., Huang, Z., & Baktashmotlagh, M. (2021). Learning to diversify for single domain generalization. In: ICCV.","DOI":"10.1109\/ICCV48922.2021.00087"},{"key":"2619_CR48","unstructured":"Sriperumbudur, B.K., Gretton, A., Fukumizu, K., Sch\u00f6lkopf, B., & Lanckriet, G.R. (2010). Hilbert space embeddings and metrics on probability measures. JMLR."},{"issue":"6","key":"2619_CR49","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L. (2012). The mnist database of handwritten digit images for machine learning research [best of the web]. IEEE signal processing magazine, 29(6), 141\u2013142.","journal-title":"IEEE signal processing magazine"},{"issue":"5","key":"2619_CR50","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/34.291440","volume":"16","author":"JJ Hull","year":"1994","unstructured":"Hull, J. J. (1994). A database for handwritten text recognition research. IEEE TPAMI, 16(5), 550\u2013554.","journal-title":"IEEE TPAMI"},{"key":"2619_CR51","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., & Ng, A.Y. (2011). Reading digits in natural images with unsupervised feature learning. In: NeurIPS Workshop on Deep Learning and Unsupervised Feature Learning"},{"key":"2619_CR52","doi-asserted-by":"crossref","unstructured":"Ganin, Y., Ustinova, E., Ajakan, H., Germain, P., Larochelle, H., Laviolette, F., Marchand, M., & Lempitsky, V. (2016). Domain-adversarial training of neural networks. JMLR.","DOI":"10.1007\/978-3-319-58347-1_10"},{"key":"2619_CR53","unstructured":"Krizhevsky, A., Hinton, G., et al. (2009). Learning multiple layers of features from tiny images"},{"key":"2619_CR54","unstructured":"Coates, A., Ng, A., & Lee, H. (2011). An analysis of single-layer networks in unsupervised feature learning. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pp. 215\u2013223. JMLR Workshop and Conference Proceedings"},{"key":"2619_CR55","unstructured":"Peng, X., Usman, B., Kaushik, N., Hoffman, J., Wang, D., & Saenko, K. (2017). Visda: The visual domain adaptation challenge. arXiv preprint arXiv:1710.06924"},{"key":"2619_CR56","unstructured":"Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"2619_CR57","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z., Lin, S., & Guo, B. (2021). Swin transformer: Hierarchical vision transformer using shifted windows. In: ICCV.","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2619_CR58","doi-asserted-by":"crossref","unstructured":"Chollet, F. (2017). Xception: Deep learning with depthwise separable convolutions. In: CVPR.","DOI":"10.1109\/CVPR.2017.195"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-025-02619-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-025-02619-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-025-02619-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:19:20Z","timestamp":1771341560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-025-02619-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["2619"],"URL":"https:\/\/doi.org\/10.1007\/s11263-025-02619-9","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]},"assertion":[{"value":"17 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"56"}}