{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:08:00Z","timestamp":1778256480116,"version":"3.51.4"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10890687","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T17:15:02Z","timestamp":1741799702000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Membership Encoding for Black-Box Neural Network Watermarking"],"prefix":"10.1109","author":[{"given":"Hangwei","family":"Zhang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"}]},{"given":"Fang-Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"}]},{"given":"Shi-Lin","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453079"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102277"},{"key":"ref4","first-page":"6978","article-title":"Watermarking deep neural networks with greedy residuals","author":"Liu","year":"2021","journal-title":"ICML"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384731"},{"key":"ref6","article-title":"Towards practical watermark for deep neural networks in federated learning","author":"Li","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS58808.2023.10374879"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3088846"},{"key":"ref10","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","volume-title":"27th USENIX security symposium (USENIX Security 18)","author":"Adi"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359801"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612515"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833693"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548390"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412684"},{"key":"ref19","first-page":"1937","article-title":"Entangled watermarks as a defense against model extraction","volume-title":"30th USENIX security symposium (USENIX Security 21)","author":"Jia"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329808"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref22","first-page":"1964","article-title":"Label-only membership inference attacks","volume-title":"International conference on machine learning.","author":"Choquette-Choo","year":"2021"},{"key":"ref23","article-title":"Dataset inference: Ownership resolution in machine learning","author":"Maini","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47436-2_35"},{"key":"ref25","article-title":"An empirical study of example forgetting during deep neural network learning","author":"Toneva","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.383"},{"key":"ref27","article-title":"Learning multiple layers of features from tiny images","volume-title":"Tech. Rep.","author":"Krizhevsky","year":"2009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437526"},{"key":"ref30","article-title":"The mnist database of handwritten digits","author":"LeCun","year":"1998"},{"key":"ref31","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10890687.pdf?arnumber=10890687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:24:14Z","timestamp":1774416254000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10890687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10890687","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}