{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:59:30Z","timestamp":1725778770530},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,19]]},"DOI":"10.1109\/icip42928.2021.9506147","type":"proceedings-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T21:08:41Z","timestamp":1629752921000},"page":"3877-3881","source":"Crossref","is-referenced-by-count":3,"title":["Transfer Learning-Based Model Protection With Secret Key"],"prefix":"10.1109","author":[{"given":"MaungMaung","family":"AprilPyone","sequence":"first","affiliation":[{"name":"Tokyo Metropolitan University,Tokyo,Japan"}]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref11","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations"},{"key":"ref12","first-page":"818","article-title":"Training dnn model with secret key for model protection","author":"aprilpyone","year":"2020","journal-title":"2020 IEEE 9th Global Conference on Consumer Electronics (GCCE)"},{"key":"ref13","first-page":"1681","article-title":"Encryption inspired adversarial defense for visual classification","author":"aprilpyone","year":"2020","journal-title":"2020 IEEE International Conference on Image Processing (ICIP)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3062977"},{"journal-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00277"},{"key":"ref17","article-title":"Piracy-resistant DNN watermarking by block-wise image transformation with secret key","author":"maungmaung","year":"2021","journal-title":"Proceedings of the 9th ACM Workshop on Information Hiding and Multimedia Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/49.668979"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2018.8448772"},{"key":"ref28","article-title":"Super-convergence: Very fast training of residual networks using large learning rates","author":"smith","year":"2017","journal-title":"arXiv 1708 07120"},{"key":"ref4","first-page":"4716","article-title":"Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks","author":"fan","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"ref6","article-title":"Deepsigns: A generic watermarking framework for IP protection of deep learning models","author":"rouhani","year":"2018","journal-title":"arXiv 1804 00750"},{"key":"ref29","article-title":"Mixed precision training","author":"micikevicius","year":"2017","journal-title":"arXiv 1710 03740"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00073"},{"key":"ref8","article-title":"Deepmarks: A digital fingerprinting framework for deep neural networks","author":"chen","year":"2018","journal-title":"arXiv 1804 03648"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"ref9","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","author":"adi","year":"2018","journal-title":"27th USENIX Security Symp"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959017"},{"key":"ref22","first-page":"745","article-title":"A gan-based image transformation scheme for privacy-preserving deep neural networks","author":"sirichotedumrong","year":"2020","journal-title":"2020 28th European Signal Processing Conference (EUSIPCO)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8804201"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2021.9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074968"},{"key":"ref26","article-title":"Fast is better than free: Revisiting adversarial training","author":"wong","year":"2020","journal-title":"International Conference on Learning Representations"},{"key":"ref25","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"International Conference on Learning Representations"}],"event":{"name":"2021 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2021,9,19]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2021,9,22]]}},"container-title":["2021 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9506008\/9506009\/09506147.pdf?arnumber=9506147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T23:52:01Z","timestamp":1670370721000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9506147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,19]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icip42928.2021.9506147","relation":{},"subject":[],"published":{"date-parts":[[2021,9,19]]}}}