{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T22:41:19Z","timestamp":1779144079950,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196550","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"159-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":405,"title":["Protecting Intellectual Property of Deep Neural Networks with Watermarking"],"prefix":"10.1145","author":[{"given":"Jialong","family":"Zhang","sequence":"first","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Zhongshu","family":"Gu","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Jiyong","family":"Jang","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Hui","family":"Wu","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Marc Ph.","family":"Stoecklin","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Heqing","family":"Huang","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Ian","family":"Molloy","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"mbox","author":"Mart\u00edn Abadi","year":"2016","unstructured":"Mart\u00edn Abadi et al mbox .. 2016 . Tensorflow : Large-scale machine learning on heterogeneous distributed systems. In arXiv:1603.04467. Mart\u00edn Abadi et almbox.. 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. In arXiv:1603.04467."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Ali Al-Haj. 2007. Combined DWT-DCT Digital Image Watermarking. In Journal of Computer Science.  Ali Al-Haj. 2007. Combined DWT-DCT Digital Image Watermarking. In Journal of Computer Science.","DOI":"10.1109\/IIT.2007.4430488"},{"key":"e_1_3_2_1_3_1","volume-title":"Elamir Abu Abaida Ali Osman, and Rameshwar Row","author":"Ali Mustafa Osman","year":"2012","unstructured":"Mustafa Osman Ali , Elamir Abu Abaida Ali Osman, and Rameshwar Row . 2012 . Invisible Digital Image Watermarking in Spatial Domain with Random Localization International Journal of Engineering and Innovative Technology . Mustafa Osman Ali, Elamir Abu Abaida Ali Osman, and Rameshwar Row. 2012. Invisible Digital Image Watermarking in Spatial Domain with Random Localization International Journal of Engineering and Innovative Technology."},{"key":"e_1_3_2_1_4_1","unstructured":"Sajid Anwar and Wonyong Sung. 2016. Compact Deep Convolutional Neural Networks With Coarse Pruning arXiv:1610.09639.  Sajid Anwar and Wonyong Sung. 2016. Compact Deep Convolutional Neural Networks With Coarse Pruning arXiv:1610.09639."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.918570"},{"key":"e_1_3_2_1_6_1","volume-title":"Towards Evaluating the Robustness of Neural Networks IEEE Symposium on Security and Privacy (S&P '17)","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks IEEE Symposium on Security and Privacy (S&P '17) . Nicholas Carlini and David Wagner. 2017. Towards Evaluating the Robustness of Neural Networks IEEE Symposium on Security and Privacy (S&P '17)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Munesh Chandra and Shikha Pandey. 2010. A DWT domain visible watermarking techniques for digital images International Conference On Electronics and Information Engineering (ICEIE '10).  Munesh Chandra and Shikha Pandey. 2010. A DWT domain visible watermarking techniques for digital images International Conference On Electronics and Information Engineering (ICEIE '10).","DOI":"10.1109\/ICEIE.2010.5559809"},{"key":"e_1_3_2_1_8_1","unstructured":"Franccois Chollet. 2015. Keras. In https:\/\/github.com\/fchollet\/keras.  Franccois Chollet. 2015. Keras. In https:\/\/github.com\/fchollet\/keras."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Gregory Cohen Saeed Afshar Jonathan Tapson and Andr\u00e9 van Schaik. 2017. EMNIST: an extension of MNIST to handwritten letters. arXiv:1702.05373.  Gregory Cohen Saeed Afshar Jonathan Tapson and Andr\u00e9 van Schaik. 2017. EMNIST: an extension of MNIST to handwritten letters. arXiv:1702.05373.","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"e_1_3_2_1_10_1","volume-title":"Digital Watermarking and Steganography","author":"Cox Ingemar","unstructured":"Ingemar Cox , Matthew Miller , Jeffrey Bloom , Jessica Fridrich , and Ton Kalker . 2007. Digital Watermarking and Steganography . In Morgan Kaufmann Publishers Inc . Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, and Ton Kalker. 2007. Digital Watermarking and Steganography. In Morgan Kaufmann Publishers Inc."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.41400"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Yoav Goldberg. 2015. A primer on neural network models for natural language processing Journal of Artificial Intelligence Research.   Yoav Goldberg. 2015. A primer on neural network models for natural language processing Journal of Artificial Intelligence Research.","DOI":"10.1613\/jair.4992"},{"key":"e_1_3_2_1_14_1","volume-title":"Deep Learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep Learning . MIT Press . http:\/\/www.deeplearningbook.org Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http:\/\/www.deeplearningbook.org"},{"key":"e_1_3_2_1_15_1","volume-title":"Speech Recognition with Deep Recurrent Neural Networks IEEE International Conference on Acoustics, Speech and Signal Processing ( ICASSP '13)","author":"Graves Alex","unstructured":"Alex Graves , Abdel-rahman Mohamed, and Geoffrey E. Hinton . 2013 . Speech Recognition with Deep Recurrent Neural Networks IEEE International Conference on Acoustics, Speech and Signal Processing ( ICASSP '13) . Alex Graves, Abdel-rahman Mohamed, and Geoffrey E. Hinton. 2013. Speech Recognition with Deep Recurrent Neural Networks IEEE International Conference on Acoustics, Speech and Signal Processing ( ICASSP '13)."},{"key":"e_1_3_2_1_16_1","unstructured":"Tianyu Gu Brendan Dolan-Gavitt and Siddharth Garg. 2017. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. In arXiv:1708.06733.  Tianyu Gu Brendan Dolan-Gavitt and Siddharth Garg. 2017. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. In arXiv:1708.06733."},{"key":"e_1_3_2_1_17_1","volume":"201","author":"Han Song","unstructured":"Song Han , Jeff Pool , John Tran , and William J. Dally. 201 5. Learning both Weights and Connections for Efficient Neural Networks Proceedings of Neural Information Processing Systems(NIPS'15). Song Han, Jeff Pool, John Tran, and William J. Dally. 2015. Learning both Weights and Connections for Efficient Neural Networks Proceedings of Neural Information Processing Systems(NIPS'15).","journal-title":"William J. Dally."},{"key":"e_1_3_2_1_18_1","volume-title":"Ng","author":"Hannun Awni","year":"2012","unstructured":"Awni Hannun , Carl Case , Jared Casper , Bryan Catanzaro , Greg Diamos , Erich Elsen , Ryan Prenger , Sanjeev Satheesh , Shubho Sengupta , Adam Coates , and Andrew Y . Ng . 2012 . Deep Speech : Scaling up end-to-end speech recognition arXiv:1412.5567. Awni Hannun, Carl Case, Jared Casper, Bryan Catanzaro, Greg Diamos, Erich Elsen, Ryan Prenger, Sanjeev Satheesh, Shubho Sengupta, Adam Coates, and Andrew Y. Ng. 2012. Deep Speech: Scaling up end-to-end speech recognition arXiv:1412.5567."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771066"},{"key":"e_1_3_2_1_20_1","volume-title":"Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16)","author":"He Kaiming","year":"2016","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016 . Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16) . Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.817598"},{"key":"e_1_3_2_1_22_1","volume-title":"Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N. Sainath, and Brian Kingsbury.","author":"Hinton Geoffrey","year":"2012","unstructured":"Geoffrey Hinton , Li Deng , Dong Yu , George E. Dahl , Abdel rahman Mohamed , Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N. Sainath, and Brian Kingsbury. 2012 . Deep Neural Networks for Acoustic Modeling in Speech Recognition : The Shared Views of Four Research Groups. In IEEE Signal Processing Magazine . Geoffrey Hinton, Li Deng, Dong Yu, George E. Dahl, Abdel rahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N. Sainath, and Brian Kingsbury. 2012. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups. In IEEE Signal Processing Magazine."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Sepp Hochreiter and Jurgen Schmidhuber. 1997. Long short-term memory. In Neural computation.  Sepp Hochreiter and Jurgen Schmidhuber. 1997. Long short-term memory. In Neural computation.","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_25_1","volume-title":"Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093","author":"Jia Yangqing","year":"2014","unstructured":"Yangqing Jia , Evan Shelhamer , Jeff Donahue , Sergey Karayev , Jonathan Long , Ross Girshick , Sergio Guadarrama , and Trevor Darrell . 2014 . Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093 (2014). Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. 2014. Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093 (2014)."},{"key":"e_1_3_2_1_26_1","volume-title":"Johnson and Sushil Jajodia","author":"Neil","year":"1998","unstructured":"Neil F. Johnson and Sushil Jajodia . 1998 . Exploring Steganography : Seeing the Unseen. In IEEE Computer . Neil F. Johnson and Sushil Jajodia. 1998. Exploring Steganography: Seeing the Unseen. In IEEE Computer."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Nikita Kashyap and G. R. SINHA. 2012. Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT) International Journal of Modern Education and Computer Science (IJMECS '12).  Nikita Kashyap and G. R. SINHA. 2012. Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT) International Journal of Modern Education and Computer Science (IJMECS '12).","DOI":"10.5815\/ijmecs.2012.03.07"},{"key":"e_1_3_2_1_28_1","volume-title":"Department of Computer Science","author":"Krizhevsky Alex","unstructured":"Alex Krizhevsky . 2009. Learning multiple layers of features from tiny images Master's thesis , Department of Computer Science , University of Toronto . Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images Master's thesis, Department of Computer Science, University of Toronto."},{"key":"e_1_3_2_1_29_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E . Hinton . 2012 . ImageNet classification with deep convolutional neural networks Proceedings of the 25th International Conference on Neural Information Processing Systems (NIPS '12). Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks Proceedings of the 25th International Conference on Neural Information Processing Systems (NIPS '12)."},{"key":"e_1_3_2_1_30_1","volume-title":"Lagendijk","author":"Langelaar Gerhard C.","year":"2000","unstructured":"Gerhard C. Langelaar , Iwan Setyawan , and Reginald L . Lagendijk . 2000 . Watermarking digital image and video data. A state-of-the-art overview IEEE Signal Processing Magazine . Gerhard C. Langelaar, Iwan Setyawan, and Reginald L. Lagendijk. 2000. Watermarking digital image and video data. A state-of-the-art overview IEEE Signal Processing Magazine."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Yann LeCun Leon Bottou Yoshua Bengio and Patrick Haffner. 1998. Gradient-based learning applied to document recognition Proceedings of the IEEE.  Yann LeCun Leon Bottou Yoshua Bengio and Patrick Haffner. 1998. Gradient-based learning applied to document recognition Proceedings of the IEEE.","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92957-4_31"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"e_1_3_2_1_34_1","unstructured":"Jiansheng Mei Sukang Li and Xiaomei Tan. 2009. A Digital Watermarking Algorithm Based On DCT and DWT Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA '09).  Jiansheng Mei Sukang Li and Xiaomei Tan. 2009. A Digital Watermarking Algorithm Based On DCT and DWT Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA '09)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"e_1_3_2_1_36_1","unstructured":"Erwan Le Merrer Patrick Perez and Gilles Tr\u00e9dan. 2017. Adversarial Frontier Stitching for Remote Neural Network Watermarking arXiv:1711.01894.  Erwan Le Merrer Patrick Perez and Gilles Tr\u00e9dan. 2017. Adversarial Frontier Stitching for Remote Neural Network Watermarking arXiv:1711.01894."},{"key":"e_1_3_2_1_37_1","volume-title":"Pruning Convolutional Neural Networks for Resource Efficient Inference International Conference on Learning Representations (ICLR '17)","author":"Molchanov Pavlo","year":"2017","unstructured":"Pavlo Molchanov , Stephen Tyree , Tero Karras , Timo Aila , and Jan Kautz . 2017 . Pruning Convolutional Neural Networks for Resource Efficient Inference International Conference on Learning Representations (ICLR '17) . Pavlo Molchanov, Stephen Tyree, Tero Karras, Timo Aila, and Jan Kautz. 2017. Pruning Convolutional Neural Networks for Resource Efficient Inference International Conference on Learning Representations (ICLR '17)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.846253"},{"key":"e_1_3_2_1_39_1","volume-title":"Comparison of Fine-Tuning and Extension Strategies for Deep Convolutional Neural Networks. In International Conference on Multimedia Modeling.","author":"Pittaras Nikiforos","year":"2017","unstructured":"Nikiforos Pittaras , Foteini Markatopoulou , Vasileios Mezaris , and Ioannis Patras . 2017 . Comparison of Fine-Tuning and Extension Strategies for Deep Convolutional Neural Networks. In International Conference on Multimedia Modeling. Nikiforos Pittaras, Foteini Markatopoulou, Vasileios Mezaris, and Ioannis Patras. 2017. Comparison of Fine-Tuning and Extension Strategies for Deep Convolutional Neural Networks. In International Conference on Multimedia Modeling."},{"key":"e_1_3_2_1_40_1","unstructured":"A. Piva M. Barni E Bartolini and V. Cappellini. 1997. DCT-based watermark recovering without resorting to the uncorrupted original image International Conference on Image Processing.   A. Piva M. Barni E Bartolini and V. Cappellini. 1997. DCT-based watermark recovering without resorting to the uncorrupted original image International Conference on Image Processing."},{"key":"e_1_3_2_1_41_1","unstructured":"Lalit Kumar Saini and Vishal Shrivastava. 2014. A Survey of Digital Watermarking Techniques and its Applications International Journal of Computer Science Trends and Technology (IJCST '14).  Lalit Kumar Saini and Vishal Shrivastava. 2014. A Survey of Digital Watermarking Techniques and its Applications International Journal of Computer Science Trends and Technology (IJCST '14)."},{"key":"e_1_3_2_1_42_1","volume-title":"International Conference on Advances in Computing, Communication, and Automation.","author":"Sheth Ravi K","unstructured":"Ravi K Sheth and V. V. Nath . 2016. Secured digital image watermarking with discrete cosine transform and discrete wavelet transform method . In International Conference on Advances in Computing, Communication, and Automation. Ravi K Sheth and V. V. Nath. 2016. Secured digital image watermarking with discrete cosine transform and discrete wavelet transform method. In International Conference on Advances in Computing, Communication, and Automation."},{"key":"e_1_3_2_1_43_1","volume-title":"Membership Inference Attacks Against Machine Learning Models IEEE Symposium on Security and Privacy (SP '17)","author":"Shokri Reza","year":"2017","unstructured":"Reza Shokri , Marco Stronati , Congzheng Song , and Vitaly Shmatikov . 2017 . Membership Inference Attacks Against Machine Learning Models IEEE Symposium on Security and Privacy (SP '17) . Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models IEEE Symposium on Security and Privacy (SP '17)."},{"key":"e_1_3_2_1_44_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition International Conference on Learning Representations (ICLR '15)","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015 . Very Deep Convolutional Networks for Large-Scale Image Recognition International Conference on Learning Representations (ICLR '15) . Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition International Conference on Learning Representations (ICLR '15)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Suraj Srinivas and R. Venkatesh Babu. 2015. Data-free Parameter Pruning for Deep Neural Networks BMVA Press.  Suraj Srinivas and R. Venkatesh Babu. 2015. Data-free Parameter Pruning for Deep Neural Networks BMVA Press.","DOI":"10.5244\/C.29.31"},{"key":"e_1_3_2_1_46_1","volume-title":"Tewfik","author":"Swanson Mitchell D.","year":"1988","unstructured":"Mitchell D. Swanson , Mei Kobayashi , and Ahmed H . Tewfik . 1988 . Multimedia data-embedding and watermarking technologies Proceedings of the IEEE. Mitchell D. Swanson, Mei Kobayashi, and Ahmed H. Tewfik. 1988. Multimedia data-embedding and watermarking technologies Proceedings of the IEEE."},{"key":"e_1_3_2_1_47_1","unstructured":"Vivienne Sze Yu-Hsin Chen Tien-Ju Yang and Joel Emer. 2017. Efficient Processing of Deep Neural Networks: A Tutorial and Survey arXiv:1703.09039.  Vivienne Sze Yu-Hsin Chen Tien-Ju Yang and Joel Emer. 2017. Efficient Processing of Deep Neural Networks: A Tutorial and Survey arXiv:1703.09039."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"e_1_3_2_1_49_1","volume-title":"Stealing Machine Learning Models via Prediction APIs Proceedings of the 25th USENIX Security Symposium (Security '16)","author":"Tramer Florian","unstructured":"Florian Tramer , Fan Zhang , Ari Juels , Michael Reiter , and Thomas Ristenpart . 2016. Stealing Machine Learning Models via Prediction APIs Proceedings of the 25th USENIX Security Symposium (Security '16) . Florian Tramer, Fan Zhang, Ari Juels, Michael Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs Proceedings of the 25th USENIX Security Symposium (Security '16)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322497"},{"key":"e_1_3_2_1_52_1","unstructured":"Jason Yosinski Jeff Clune Yoshua Bengio and Hod Lipson. 2014. How transferable are features in deep neural networks? Neural Information Processing Systems.   Jason Yosinski Jeff Clune Yoshua Bengio and Hod Lipson. 2014. How transferable are features in deep neural networks? Neural Information Processing Systems."},{"key":"e_1_3_2_1_53_1","volume-title":"Visualizing and understanding convolutional networks European conference on computer vision","author":"Zeiler Matthew D","unstructured":"Matthew D Zeiler and Rob Fergus . 2014. Visualizing and understanding convolutional networks European conference on computer vision . Springer , 818--833. Matthew D Zeiler and Rob Fergus. 2014. Visualizing and understanding convolutional networks European conference on computer vision. Springer, 818--833."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCIP.2009.141"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196550"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":54,"alternative-id":["10.1145\/3196494.3196550","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196550","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}