{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T06:08:24Z","timestamp":1777874904049,"version":"3.51.4"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12126609"],"award-info":[{"award-number":["12126609"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014881","name":"Guangzhou University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014881","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.csi.2026.104141","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:57:40Z","timestamp":1770278260000},"page":"104141","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Breaking cross-domain model protection via surrogate-guided unsupervised distribution transformation"],"prefix":"10.1016","volume":"97","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5823-8343","authenticated-orcid":false,"given":"Huali","family":"Ren","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8751-8071","authenticated-orcid":false,"given":"Pengyu","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ziyu","family":"Ding","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weitong","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiachao","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chong-zhi","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.csi.2026.104141_b1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.media.2019.02.010","article-title":"Medical image classification using synergic deep learning","volume":"54","author":"Zhang","year":"2019","journal-title":"Med. Image Anal."},{"issue":"4","key":"10.1016\/j.csi.2026.104141_b2","doi-asserted-by":"crossref","first-page":"1100","DOI":"10.1109\/TITS.2017.2714691","article-title":"Traffic sign recognition using a multi-task convolutional neural network","volume":"19","author":"Luo","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.csi.2026.104141_b3","series-title":"GanFinger: GAN-based fingerprint generation for deep neural network ownership verification","author":"Ren","year":"2023"},{"key":"10.1016\/j.csi.2026.104141_b4","series-title":"Non-transferable learning: A new approach for model ownership verification and applicability authorization","author":"Wang","year":"2021"},{"key":"10.1016\/j.csi.2026.104141_b5","doi-asserted-by":"crossref","unstructured":"L. Wang, M. Wang, D. Zhang, H. Fu, Model barrier: A compact un-transferable isolation domain for model intellectual property protection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 20475\u201320484.","DOI":"10.1109\/CVPR52729.2023.01961"},{"key":"10.1016\/j.csi.2026.104141_b6","doi-asserted-by":"crossref","unstructured":"B. Peng, S. Qu, Y. Wu, T. Zou, L. He, A. Knoll, G. Chen, C. Jiang, MAP: MAsk-Pruning for Source-Free Model Intellectual Property Protection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024, pp. 23585\u201323594.","DOI":"10.1109\/CVPR52733.2024.02226"},{"key":"10.1016\/j.csi.2026.104141_b7","doi-asserted-by":"crossref","unstructured":"L. Wang, M. Wang, H. Fu, D. Zhang, Vision-Language Model IP Protection via Prompt-based Learning, in: Proceedings of the Computer Vision and Pattern Recognition Conference, 2025, pp. 9497\u20139506.","DOI":"10.1109\/CVPR52734.2025.00887"},{"key":"10.1016\/j.csi.2026.104141_b8","series-title":"European Conference on Computer Vision","first-page":"375","article-title":"Non-transferable pruning","author":"Ding","year":"2024"},{"key":"10.1016\/j.csi.2026.104141_b9","article-title":"A comprehensive survey on source-free domain adaptation","author":"Li","year":"2024","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.csi.2026.104141_b10","doi-asserted-by":"crossref","first-page":"6973","DOI":"10.1109\/ACCESS.2023.3237025","article-title":"Domain adaptation: challenges, methods, datasets, and applications","volume":"11","author":"Singhal","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.csi.2026.104141_b11","doi-asserted-by":"crossref","unstructured":"S. Yang, Y. Wang, J. Van De Weijer, L. Herranz, S. Jui, Generalized source-free domain adaptation, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2021, pp. 8978\u20138987.","DOI":"10.1109\/ICCV48922.2021.00885"},{"issue":"5","key":"10.1016\/j.csi.2026.104141_b12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3400066","article-title":"A survey of unsupervised deep domain adaptation","volume":"11","author":"Wilson","year":"2020","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"10.1016\/j.csi.2026.104141_b13","doi-asserted-by":"crossref","unstructured":"Z. Hong, L. Shen, T. Liu, Your Transferability Barrier is Fragile: Free-Lunch for Transferring the Non-Transferable Learning, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024, pp. 28805\u201328815.","DOI":"10.1109\/CVPR52733.2024.02721"},{"key":"10.1016\/j.csi.2026.104141_b14","series-title":"International Conference on Data Security and Privacy Protection","first-page":"221","article-title":"Bypassing cross-domain restrictions with unsupervised visual translation","author":"Ren","year":"2025"},{"key":"10.1016\/j.csi.2026.104141_b15","unstructured":"Y. Adi, C. Baum, M. Cisse, B. Pinkas, J. Keshet, Turning your weakness into a strength: Watermarking deep neural networks by backdooring, in: 27th USENIX Security Symposium, USENIX Security 18, 2018, pp. 1615\u20131631."},{"key":"10.1016\/j.csi.2026.104141_b16","series-title":"ICMR2017","article-title":"Embedding watermarks into deep neural networks","author":"Uchida","year":"2017"},{"key":"10.1016\/j.csi.2026.104141_b17","series-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","article-title":"Protecting intellectual property of deep neural networks with watermarking","author":"Zhang","year":"2018"},{"key":"10.1016\/j.csi.2026.104141_b18","series-title":"Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security","article-title":"REFIT: a unified watermark removal framework for deep learning systems with limited data","author":"Chen","year":"2021"},{"key":"10.1016\/j.csi.2026.104141_b19","series-title":"Fine-tuning is not enough: A simple yet effective watermark removal attack for DNN models","author":"Guo","year":"2020"},{"key":"10.1016\/j.csi.2026.104141_b20","series-title":"Toward robust non-transferable learning: A survey and benchmark","author":"Hong","year":"2025"},{"key":"10.1016\/j.csi.2026.104141_b21","unstructured":"Z. Hong, Z. Wang, L. Shen, Y. Yao, Z. Huang, S. Chen, C. Yang, M. Gong, T. Liu, Improving non-transferable representation learning by harnessing content and style, in: The Twelfth International Conference on Learning Representations, 2024."},{"key":"10.1016\/j.csi.2026.104141_b22","series-title":"Unsupervised non-transferable text classification","author":"Zeng","year":"2022"},{"key":"10.1016\/j.csi.2026.104141_b23","series-title":"Hardware-assisted intellectual property protection of deep learning models","author":"Chakraborty","year":"2020"},{"key":"10.1016\/j.csi.2026.104141_b24","series-title":"Deep-lock: Secure authorization for deep neural networks.","author":"Alam","year":"2020"},{"key":"10.1016\/j.csi.2026.104141_b25","series-title":"Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"Ronneberger","year":"2015"},{"key":"10.1016\/j.csi.2026.104141_b26","series-title":"Transformers for image recognition at scale","author":"Neil","year":"2020"},{"issue":"6","key":"10.1016\/j.csi.2026.104141_b27","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","article-title":"The mnist database of handwritten digit images for machine learning research [best of the web]","volume":"29","author":"Deng","year":"2012","journal-title":"IEEE Signal Process. Mag."},{"issue":"5","key":"10.1016\/j.csi.2026.104141_b28","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/34.291440","article-title":"A database for handwritten text recognition research","volume":"16","author":"Hull","year":"1994","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"59","key":"10.1016\/j.csi.2026.104141_b29","first-page":"1","article-title":"Domain-adversarial training of neural networks","volume":"17","author":"Ganin","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.csi.2026.104141_b30","first-page":"4","article-title":"Reading digits in natural images with unsupervised feature learning","volume":"vol. 2011","author":"Netzer","year":"2011"},{"key":"10.1016\/j.csi.2026.104141_b31","series-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"10.1016\/j.csi.2026.104141_b32","series-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics","first-page":"215","article-title":"An analysis of single-layer networks in unsupervised feature learning","author":"Coates","year":"2011"},{"key":"10.1016\/j.csi.2026.104141_b33","doi-asserted-by":"crossref","unstructured":"J.Y. Zhu, T. Park, P. Isola, A.A. Efros, Unpaired image-to-image translation using cycle-consistent adversarial networks, in: Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 2223\u20132232.","DOI":"10.1109\/ICCV.2017.244"},{"key":"10.1016\/j.csi.2026.104141_b34","series-title":"Adversarial unlearning of backdoors via implicit hypergradient","author":"Zeng","year":"2021"},{"key":"10.1016\/j.csi.2026.104141_b35","doi-asserted-by":"crossref","unstructured":"M. Zhu, S. Wei, L. Shen, Y. Fan, B. Wu, Enhancing fine-tuning based backdoor defense with sharpness-aware minimization, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023, pp. 4466\u20134477.","DOI":"10.1109\/ICCV51070.2023.00412"}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548926000152?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548926000152?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T20:31:57Z","timestamp":1777581117000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548926000152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":35,"alternative-id":["S0920548926000152"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2026.104141","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Breaking cross-domain model protection via surrogate-guided unsupervised distribution transformation","name":"articletitle","label":"Article Title"},{"value":"Computer Standards & Interfaces","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.csi.2026.104141","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104141"}}