{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:34:10Z","timestamp":1774539250967,"version":"3.50.1"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"APRC grant from CityU Hong Kong","award":["9610488"],"award-info":[{"award-number":["9610488"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61629301"],"award-info":[{"award-number":["61629301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002334"],"award-info":[{"award-number":["62002334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072421"],"award-info":[{"award-number":["62072421"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["WK2100000011"],"award-info":[{"award-number":["WK2100000011"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["WK5290000001"],"award-info":[{"award-number":["WK5290000001"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key RD Program of China","award":["2018AAA0101400"],"award-info":[{"award-number":["2018AAA0101400"]}]},{"name":"ECS grant from the Research Grants Council of the Hong Kong","award":["CityU 21209119"],"award-info":[{"award-number":["CityU 21209119"]}]},{"name":"Exploration Fund Project of University of Science and Technology of China","award":["YD3480002001"],"award-info":[{"award-number":["YD3480002001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tpami.2021.3064850","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T22:02:15Z","timestamp":1615327335000},"page":"1-1","source":"Crossref","is-referenced-by-count":83,"title":["Deep Model Intellectual Property Protection via Deep Watermarking"],"prefix":"10.1109","author":[{"given":"Jie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Dongdong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huamin","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"4716","article-title":"Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks","author":"fan","year":"2019","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240862"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2020.10.2.932"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560428"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3030671"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304051"},{"key":"ref35","article-title":"BlackMarks: Blackbox multibit watermarking for deep neural networks","author":"chen","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-018-0147-1"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00079"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.369"},{"key":"ref61","first-page":"740","article-title":"Microsoft COCO: Common objects in context","author":"lin","year":"2014","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2878541"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/83.817598"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2039604"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"hsu","year":"1999","journal-title":"IEEE Trans Image Process"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815957"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/83.918570"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.355"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2366145.2366158"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref1","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref20","first-page":"242","article-title":"Embedding robust labels into images for copyright protection","author":"zhao","year":"1995","journal-title":"Proc Conf Intellectual Property Rights New Technol"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/30.809176","article-title":"An adaptive digital image watermarking technique for copyright protection","volume":"45","author":"lee","year":"1999","journal-title":"IEEE Trans Consum Electron"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1996.545849"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.02.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2005.71"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1117\/12.465289"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3009349"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00917"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref58","first-page":"694","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"johnson","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.351"},{"key":"ref56","first-page":"234","article-title":"U-Net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"Proc Int Conf Med Image Comput Comput -Assisted Intervention"},{"key":"ref55","first-page":"1857","article-title":"Learning to discover cross-domain relations with generative adversarial networks","author":"kim","year":"2017","journal-title":"Proc 34th Int Conf Mach Learn"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.310"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00244"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"ref40","first-page":"22619","article-title":"Passport-aware normalization for deep model protection","volume":"33","author":"zhang","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref11","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","author":"adi","year":"2018","journal-title":"Proc 27th USENIX Conf Secur Symp"},{"key":"ref12","first-page":"2654","article-title":"Do deep nets really need to be deep?","author":"ba","year":"2014","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref13","article-title":"Distilling the knowledge in a neural network","volume":"1050","author":"hinton","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6976"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.337432"},{"key":"ref18","first-page":"1","article-title":"Content adaptive watermarking based on a stochastic multiresolution image modeling","author":"voloshynovskiy","year":"2000","journal-title":"Proc 10th Eur Signal Process Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958294"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6579\/ab15a2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.22489\/CinC.2017.178-245"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63564-4_3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61845-6_33"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2016-1446"},{"key":"ref49","first-page":"5967","article-title":"Image-to-image translation with conditional adversarial networks","author":"isola","year":"2017","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref9","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3009844"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_16"},{"key":"ref48","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2016.08.004"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.126"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.296"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00151"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2964205"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/4359286\/09373945.pdf?arnumber=9373945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:15:53Z","timestamp":1656965753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9373945\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/tpami.2021.3064850","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}