{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:06:29Z","timestamp":1750824389921,"version":"3.41.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472432"],"award-info":[{"award-number":["62472432"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/cscwd64889.2025.11033605","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:40Z","timestamp":1750699480000},"page":"159-164","source":"Crossref","is-referenced-by-count":0,"title":["GRWO: Toward Efficient Model Protection of Edge Inference via Very Few Weights Obfuscation Based on Gradient Ranking"],"prefix":"10.1109","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology,Changsha,China"}]},{"given":"Yan","family":"Ding","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology,Changsha,China"}]},{"given":"Yusong","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology,Changsha,China"}]},{"given":"Xing","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology,Changsha,China"}]},{"given":"Jianfeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology,Changsha,China"}]},{"given":"Chunyan","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology,Changsha,China"}]},{"given":"Yuanming","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology,Changsha,China"}]},{"given":"Xiaochuan","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology,Changsha,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3189186"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.adk6874"},{"key":"ref3","first-page":"1955","article-title":"Mind your weight (s): A large-scale study on insufficient machine learning model protection in mobile apps","volume-title":"30th USENIX security symposium (USENIX security 21)","author":"Sun"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00092"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116560"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621088"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179382"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00052"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3126315"},{"key":"ref10","first-page":"42614","article-title":"Nnsplitter: an active defense solution for dnn model via automated weight obfuscation","volume-title":"International Conference on Machine Learning (ICML)","author":"Zhou"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00961"},{"key":"ref12","first-page":"2013","author":"Redmon","year":"2024","journal-title":"Darknet: Open source neural networks in c"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"journal-title":"Very deep convolutional networks for large-scale image recognition","year":"2014","author":"Simonyan","key":"ref14"},{"key":"ref15","first-page":"723","article-title":"Soter: Guarding black-box inference for general neural networks at the edge","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22","author":"Shen"},{"key":"ref16","first-page":"17629","article-title":"Pruning filter in filter","volume-title":"Advances in Neural Information Processing Systems (Neu rIPS)","volume":"33","author":"Meng","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586226"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103180"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00130"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref21","first-page":"314","article-title":"Scalable membership inference attacks via quantile regression","volume-title":"Advances in Neural Information Processing Systems (NeurIPS)","volume":"36","author":"Bertran","year":"2023"},{"key":"ref22","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"University of Toronto, Tech. Rep."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"}],"event":{"name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2025,5,5]]},"location":"Compiegne, France","end":{"date-parts":[[2025,5,7]]}},"container-title":["2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11033175\/11033221\/11033605.pdf?arnumber=11033605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:04:51Z","timestamp":1750748691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11033605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cscwd64889.2025.11033605","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}