{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:37:26Z","timestamp":1753601846806,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100015811","name":"Science and Technology Department of Ningxia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015811","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,4]]},"DOI":"10.1109\/icassp49357.2023.10096448","type":"proceedings-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T17:28:30Z","timestamp":1683307710000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Measure and Countermeasure of the Capsulation Attack Against Backdoor-Based Deep Neural Network Watermarks"],"prefix":"10.1109","author":[{"given":"Fang-Qi","family":"Li","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"}]},{"given":"Shi-Lin","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"}]},{"given":"Yun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"}]}],"member":"263","reference":[{"key":"ref13","first-page":"1","article-title":"Secure neural network watermarking protocol against forging attack","author":"renjie","year":"2020","journal-title":"EURASIP Journal on Image and Video Processing"},{"key":"ref12","first-page":"4005","article-title":"Deep Model Intellectual Property Protection via Deep Watermarking","author":"jie","year":"2022","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref15","first-page":"1","article-title":"Copy, right? a testing framework for copyright protection of deep learning models","author":"jialuo","year":"2022","journal-title":"Proceedings of IEEE Security and Privacy"},{"key":"ref14","first-page":"159","article-title":"Protecting intellectual property of deep neural networks with watermarking","author":"jialong","year":"2018","journal-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security"},{"key":"ref20","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009","journal-title":"Citeseer Tech Rep"},{"article-title":"Persistent and unforgeable watermarks for deep neural networks","year":"2019","author":"huiying","key":"ref11"},{"key":"ref22","first-page":"770","article-title":"Deep residual learning for image recognition","author":"kaiming","year":"2016","journal-title":"Proceedings of the IEEE CVPR"},{"key":"ref10","first-page":"1","article-title":"Deep model intellectual property protection via deep watermarking","author":"jie","year":"2021","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.79"},{"key":"ref2","first-page":"3049","article-title":"Fostering The Robustness Of White-Box Deep Neural Network Watermarks By Neuron Alignment","author":"fangqi","year":"2022","journal-title":"Proceedings of IEEE ICASSP"},{"key":"ref1","article-title":"Intellectual property protection for deep learning models: Taxonomy, methods, attacks, and evaluations","author":"mingfu","year":"2021","journal-title":"IEEE Transactions on Artificial Intelligence"},{"key":"ref17","first-page":"707","article-title":"Neural cleanse: Identifying and mitigating backdoor attacks in neural networks","author":"bolun","year":"2019","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"ref16","first-page":"228","article-title":"Robust watermarking of neural network with exponential weighting","author":"ryota","year":"2019","journal-title":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"},{"key":"ref19","first-page":"3169","article-title":"A survey of handwritten character recognition with mnist and emnist","volume":"2019","author":"alejandro","year":"0","journal-title":"Applied Sciences"},{"key":"ref18","first-page":"1","article-title":"Watermarking Protocol for Deep Neural Network Ownership Regulation in Federated Learning","author":"fangqi","year":"2022","journal-title":"Proc IEEE ICME"},{"key":"ref8","first-page":"97","article-title":"Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation","author":"haoti","year":"2020","journal-title":"Proceedings of the 10th ACM Conference on Data and Application Security and Privacy"},{"key":"ref7","first-page":"10675","article-title":"Zero-shot knowledge distillation from a decision-based black-box model","author":"zi","year":"2021","journal-title":"Proceedings of the International Conference on Machine Learning"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00363"},{"key":"ref4","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by back-dooring","author":"adi","year":"2018","journal-title":"Proceedings of the 27th USENIX Security Symposium"},{"key":"ref3","first-page":"3064","article-title":"Encryption Resistant Deep Neural Network Watermarking","author":"guobiao","year":"2022","journal-title":"Proceedings of IEEE ICASSP"},{"key":"ref6","first-page":"3063","article-title":"Persistent Watermark For Image Classification Neural Networks By Penetrating The Autoencoder","author":"fangqi","year":"2021","journal-title":"Proceedings of IEEE ICIP"},{"key":"ref5","first-page":"3635","article-title":"Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models","author":"shangwei","year":"2021","journal-title":"Proceedings of IJCAI"}],"event":{"name":"ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2023,6,4]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2023,6,10]]}},"container-title":["ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10094559\/10094560\/10096448.pdf?arnumber=10096448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T18:58:42Z","timestamp":1700506722000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10096448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icassp49357.2023.10096448","relation":{},"subject":[],"published":{"date-parts":[[2023,6,4]]}}}