{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T05:10:20Z","timestamp":1756357820950,"version":"3.44.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:00:00Z","timestamp":1751760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:00:00Z","timestamp":1751760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,6]]},"DOI":"10.1109\/isvlsi65124.2025.11130294","type":"proceedings-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:20:15Z","timestamp":1756318815000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Watermarking Edge Neural Network for Object Detection"],"prefix":"10.1109","author":[{"given":"Xiaoxu","family":"Peng","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology,Department of Control Science and Engineering,Harbin,China"}]},{"given":"Anh Tu","family":"Ngo","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,College of Computing and Data Science,Singapore"}]},{"given":"Farrel","family":"Koh","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,College of Computing and Data Science,Singapore"}]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,College of Computing and Data Science,Singapore"}]}],"member":"263","reference":[{"volume-title":"Genesis of American Patent and Copyright Law","year":"1967","author":"Bugbee","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3595292"},{"article-title":"Etsi isg sai gr 010: Traceability of ai models","year":"2024","author":"SAI","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"ref5","first-page":"1615","article-title":"Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring","volume-title":"27th USENIX Security Symposium","author":"Adi"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"article-title":"BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain","year":"2019","author":"Gu","key":"ref7"},{"key":"ref8","first-page":"1","article-title":"A survey of deep neural network watermarking techniques","volume":"419","author":"Li","year":"2021","journal-title":"Neurocomputing"},{"article-title":"Jetson nano developer kit","year":"2024","author":"Corporation","key":"ref9"},{"article-title":"Coral usb accelerator","year":"2024","author":"LLC","key":"ref10"},{"article-title":"Ultralytics yolo11","year":"2024","author":"Jocher","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3088846"},{"key":"ref13","article-title":"Tattooed: A robust deep neural network watermarking scheme based on spread-spectrum channel coding","author":"Pagnotta","year":"2022","journal-title":"arXiv preprint arXiv:2202.06091"},{"key":"ref14","article-title":"Blackmarks: Blackbox multibit watermarking for deep neural networks","author":"Chen","year":"2019","journal-title":"arXiv preprint arXiv:1904.00344"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329808"},{"key":"ref16","first-page":"1450","article-title":"Certified neural network watermarks with randomized smoothing","volume-title":"International Conference on Machine Learning","author":"Bansal"},{"key":"ref17","first-page":"1937","article-title":"Entangled Watermarks as a Defense against Model Extraction","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Jia"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/rs17030481"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaaiss.v4i1.31772"},{"article-title":"Which layer is learning faster? a systematic exploration of layer-wise convergence rate for deep neural networks","volume-title":"The Eleventh International Conference on Learning Representations","author":"Chen","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2118\/18761-MS"}],"event":{"name":"2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","start":{"date-parts":[[2025,7,6]]},"location":"Kalamata, Greece","end":{"date-parts":[[2025,7,9]]}},"container-title":["2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129697\/11130193\/11130294.pdf?arnumber=11130294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T04:32:31Z","timestamp":1756355551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isvlsi65124.2025.11130294","relation":{},"subject":[],"published":{"date-parts":[[2025,7,6]]}}}