{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:40:03Z","timestamp":1751092803363,"version":"3.41.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,3]]},"DOI":"10.1109\/eucnc\/6gsummit63408.2025.11036922","type":"proceedings-article","created":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T17:40:15Z","timestamp":1750959615000},"page":"757-762","source":"Crossref","is-referenced-by-count":0,"title":["AI Model Signing for Integrity Verification"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Brodzik","sequence":"first","affiliation":[{"name":"Institute of Computer Science, Warsaw University of Technology,Warsaw,Poland"}]},{"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Warsaw University of Technology,Warsaw,Poland"}]}],"member":"263","reference":[{"journal-title":"A large-scale exploit instrumentation study of ai supply chain attacks in hugging face models","year":"2024","author":"Casey","key":"ref1"},{"journal-title":"JFrog","article-title":"Data scientists targeted by malicious hugging face ml models with silent backdoor","author":"Cohen","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7249\/rra2849-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MECO62516.2024.10577883"},{"key":"ref5","article-title":"Meta-sealing: A revolutionizing integrity assurance protocol for transparent, tamper-proof, and trustworthy ai system","author":"Krishnamoorthy","year":"2024","journal-title":"arXiv preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.01262018"},{"volume-title":"Deploying ai systems securely: Best practices for deploying secure and resilient ai systems","year":"2024","key":"ref7"},{"volume-title":"Guidelines for secure ai system development","year":"2023","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3055927"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.AI.100-2e2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/sym14020273"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560596"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133958"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.70589\/jrtcse.2024.4.1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1117\/12.3025025"},{"key":"ref16","first-page":"351","article-title":"Model governance: Reducing the anarchy of production ML","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","volume":"7","author":"Sridhar","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2900638"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCSB63463.2024.10735521"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3503488"},{"journal-title":"Is your ai truly yours? leveraging blockchain for copyrights, provenance, and lineage","year":"2024","author":"Sai","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42504-3_26"},{"volume-title":"Pickle files: The new ml model attack vector","year":"2022","key":"ref22"},{"volume-title":"Hijacking safetensors conversion on hugging face","year":"2024","key":"ref23"},{"key":"ref24","first-page":"15708","article-title":"Git-theta: A git extension for collaborative development of machine learning models","volume-title":"International Conference on Machine Learning","author":"Kandpal","year":"2023"}],"event":{"name":"2025 Joint European Conference on Networks and Communications &amp; 6G Summit (EuCNC\/6G Summit)","start":{"date-parts":[[2025,6,3]]},"location":"Poznan, Poland","end":{"date-parts":[[2025,6,6]]}},"container-title":["2025 Joint European Conference on Networks and Communications &amp;amp; 6G Summit (EuCNC\/6G Summit)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11036818\/11036731\/11036922.pdf?arnumber=11036922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:04:21Z","timestamp":1751090661000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11036922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/eucnc\/6gsummit63408.2025.11036922","relation":{},"subject":[],"published":{"date-parts":[[2025,6,3]]}}}