{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:56:33Z","timestamp":1773510993365,"version":"3.50.1"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["M22004"],"award-info":[{"award-number":["M22004"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92270204"],"award-info":[{"award-number":["92270204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Academy of Artificial Intelligence"},{"name":"CCF-Huawei Innovation Research Plan"},{"name":"Ripple University Blockchain Research Initiative"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1109\/tdsc.2023.3242737","type":"journal-article","created":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T18:59:01Z","timestamp":1675709941000},"page":"5214-5229","source":"Crossref","is-referenced-by-count":48,"title":["A Robustness-Assured White-Box Watermark in Neural Networks"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2671-4314","authenticated-orcid":false,"given":"Peizhuo","family":"Lv","sequence":"first","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Pan","family":"Li","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Shengzhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Metropolitan College, Boston University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-9918","authenticated-orcid":false,"given":"Ruigang","family":"Liang","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hualong","family":"Ma","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yue","family":"Zhao","sequence":"additional","affiliation":[{"name":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8256-6988","authenticated-orcid":false,"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"Computer and Information Science Department, University of Oregon, Eugene, OR, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Fu (tally)","year":"2020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"ref4","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014"},{"key":"ref5","article-title":"Googles neural machine translation system: Bridging the gap between human and machine translation","author":"Wu","year":"2016"},{"issue":"76","key":"ref6","first-page":"2493","article-title":"Natural language processing (almost) from scratch","volume":"12","author":"Collobert","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2756440"},{"key":"ref8","article-title":"Deep speech 2: End-to-end speech recognition in english and mandarin","author":"Amodei","year":"2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.003"},{"key":"ref10","article-title":"Patentability of artificial intelligence in Europe: Is artificial intelligence patentable according to the european patent convention and is the current legal framework for patents suitable for patenting artificial intelligence?","author":"Lankinen","year":"2020","journal-title":"Dissertation"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2457918"},{"key":"ref12","first-page":"2672","article-title":"Security issues in cloud computing and countermeasures","volume":"3","author":"Jamil","year":"2011","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.113"},{"key":"ref14","article-title":"Common sense guide to mitigating insider threats, sixth edition","author":"Theis","year":"2019"},{"key":"ref15","volume-title":"TensorFlow LITE","year":"2022"},{"key":"ref16","volume-title":"Cainvas","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847265"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CRV.2018.00023"},{"key":"ref19","volume-title":"Model Zoo","author":"Koh","year":"2021"},{"key":"ref20","volume-title":"ONNX","year":"2022"},{"key":"ref21","volume-title":"Hugging Face","author":"Face","year":"2022"},{"key":"ref22","volume-title":"2021 VIPriors Image Classification Challenge","year":"2021"},{"key":"ref23","volume-title":"The Difference Between White Box and Black Box AI","author":"ClOUD","year":"2022"},{"key":"ref24","volume-title":"Why White-Box Models in Enterprise Data Sci. Work More Efficiently","year":"2020"},{"key":"ref25","volume-title":"Creating Trustworthy AI for the Environment: Transparency, Bias, and Beneficial Use","author":"McNally","year":"2020"},{"key":"ref26","volume-title":"Explainable & Trustworthy AI","author":"Backere","year":"2022"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/5.771066"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325042"},{"key":"ref33","first-page":"6978","article-title":"Watermarking deep neural networks with greedy residuals","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liu"},{"key":"ref34","article-title":"DeepSigns: A generic watermarking framework for ip protection of deep learning models","author":"Rouhani","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833693"},{"key":"ref36","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Adi"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240862"},{"key":"ref39","volume-title":"HufuNet Project","author":"Lv","year":"2023"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682202"},{"key":"ref41","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017"},{"key":"ref42","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359801"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329808"},{"key":"ref45","first-page":"1937","article-title":"Entangled watermarks as a defense against model extraction","volume-title":"Proc. USENIX Secur. Symp.","author":"Jia"},{"key":"ref46","article-title":"Effectiveness of distillation attack and countermeasure on neural network watermarking","author":"Yang","year":"2019"},{"key":"ref47","first-page":"1","article-title":"Leveraging unlabeled data for watermark removal of deep neural networks","volume-title":"Proc. ICML Workshop Secur. Privacy Mach. Learn.","author":"Chen"},{"key":"ref48","article-title":"Have you stolen my model? Evasion attacks against deep neural network watermarking techniques","author":"Hitaj","year":"2018"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1355"},{"key":"ref53","volume-title":"GPT-3 Cost","author":"Wiggers","year":"2020"},{"key":"ref54","volume-title":"How to Detect Code Plagiarism","author":"Herold","year":"2021"},{"key":"ref55","volume-title":"A Syst. for Detecting Softw. Similarity","author":"Aiken","year":"2022"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464461"},{"key":"ref57","first-page":"211","article-title":"JSidentify: A hybrid framework for detecting plagiarism among JavaScript code in online mini games","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.: Softw. Eng. Pract.","author":"Xia"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2570554"},{"key":"ref59","first-page":"1901","article-title":"DRMI: A dataset reduction technology based on mutual information for black-box attacks","volume-title":"Proc. USENIX Secur. Symp.","author":"He"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460401"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"ref62","first-page":"37","article-title":"Autoencoders, unsupervised learning, and deep architectures","volume-title":"Proc. ICML Workshop Unsupervised Transfer Learn.","author":"Baldi"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01352"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref69","first-page":"142","article-title":"Learning word vectors for sentiment analysis","volume-title":"Proc. 49th Annu. Meeting Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Maas"},{"key":"ref70","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.conbuildmat.2017.09.110"},{"key":"ref73","first-page":"1135","article-title":"Learning both weights and connections for efficient neural networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Han"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"ref75","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume-title":"Proc. 5th Berkeley Symp. Math. Statist. Probability","author":"MacQueen"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.2307\/2291267"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10314839\/10038500.pdf?arnumber=10038500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T17:33:48Z","timestamp":1716572028000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10038500\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11]]},"references-count":76,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3242737","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11]]}}}