{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:45:27Z","timestamp":1748583927489,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,13]]},"DOI":"10.1109\/gcce50665.2020.9291813","type":"proceedings-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T01:16:46Z","timestamp":1608599806000},"page":"818-821","source":"Crossref","is-referenced-by-count":10,"title":["Training DNN Model with Secret Key for Model Protection"],"prefix":"10.1109","author":[{"given":"April","family":"Pyone","sequence":"first","affiliation":[]},{"given":"Maung","family":"Maung","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations"},{"key":"ref11","article-title":"Encryption inspired adversarial defense for visual classification","author":"maungmaung","year":"0","journal-title":"arXiv preprint arXiv 2005 07998 2020 to appear in the 27th IEEE International Conference on Image Processing (ICIP 2020)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2018.8448772"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881677"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8804201"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2018.33"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016MUL0002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/49.668979"},{"key":"ref19","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009","journal-title":"Tech Rep"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00073"},{"key":"ref3","first-page":"4716","article-title":"Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks","author":"fan","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref5","article-title":"Deepsigns: A generic watermarking framework for ip protection of deep learning models","author":"rouhani","year":"2018","journal-title":"arXiv preprint arXiv 1804 00209"},{"key":"ref8","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","author":"adi","year":"2018","journal-title":"Proceedings of the 27th USENIX Security Symposium"},{"key":"ref7","article-title":"Deepmarks: A digital fingerprinting framework for deep neural networks","author":"chen","year":"2018","journal-title":"arXiv preprint arXiv 1804 03583"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref22","article-title":"Mixed precision training","volume":"abs 1710 3740","author":"micikevicius","year":"2017","journal-title":"CoRR"},{"key":"ref21","article-title":"Super-convergence: Very fast training of residual networks using large learning rates","volume":"abs 1708 7120","author":"smith","year":"2017","journal-title":"CoRR"},{"key":"ref23","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"International Conference on Learning Representations"}],"event":{"name":"2020 IEEE 9th Global Conference on Consumer Electronics (GCCE)","start":{"date-parts":[[2020,10,13]]},"location":"Kobe, Japan","end":{"date-parts":[[2020,10,16]]}},"container-title":["2020 IEEE 9th Global Conference on Consumer Electronics (GCCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9291702\/9291703\/09291813.pdf?arnumber=9291813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:53:21Z","timestamp":1656345201000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9291813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/gcce50665.2020.9291813","relation":{},"subject":[],"published":{"date-parts":[[2020,10,13]]}}}