{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T18:04:44Z","timestamp":1777658684049,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304051","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"485-497","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":189,"title":["DeepSigns"],"prefix":"10.1145","author":[{"given":"Bita","family":"Darvish Rouhani","sequence":"first","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]},{"given":"Huili","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Deep learning","author":"LeCun Y.","unstructured":"Y. LeCun, Y. Bengio, and G. Hinton, \u201cDeep learning,\u201d nature, vol. 521, no. 7553, 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1561\/2000000039"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3086952"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.152"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.022071131"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/993651"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the","author":"Hartung F.","unstructured":"F. Hartung and M. Kutter, \u201cMultimedia watermarking techniques,\u201d Proceedings of the IEEE, vol. 87, no. 7, 1999."},{"key":"e_1_3_2_1_8_1","volume-title":"Intellectual property protection in VLSI designs: theory and practice","author":"Qu G.","year":"2007","unstructured":"G. Qu and M. Potkonjak, Intellectual property protection in VLSI designs: theory and practice. Springer Science & Business Media, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/975320"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-018-0147-1"},{"key":"e_1_3_2_1_13_1","volume-title":"Adversarial frontier stitching for remote neural network watermarking","author":"Merrer E. L.","year":"1894","unstructured":"E. L. Merrer, P. Perez, and G. Tr\u00e9dan, \u201cAdversarial frontier stitching for remote neural network watermarking,\u201d arXiv preprint arXiv:1711.01894, 2017."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277324"},{"key":"e_1_3_2_1_15_1","volume-title":"On the (statistical) detection of adversarial examples","author":"Grosse K.","year":"2017","unstructured":"K. Grosse, P. Manoharan, N. Papernot, M. Backes, and P. McDaniel, \u201cOn the (statistical) detection of adversarial examples,\u201d arXiv preprint arXiv:1702.06280, 2017."},{"key":"e_1_3_2_1_16_1","article-title":"Safe machine learning and defeat-ing adversarial attacks","author":"Rouhani B. D.","year":"2018","unstructured":"B. D. Rouhani, M. Samragh, T. Javidi, and F. Koushanfar, \u201cSafe machine learning and defeat-ing adversarial attacks,\u201d IEEE Security and Privacy (S&P) Magazine, 2018.","journal-title":"IEEE Security and Privacy (S&P) Magazine"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240791"},{"key":"e_1_3_2_1_18_1","volume-title":"Explaining and harnessing adversarial examples","author":"Goodfellow I. J.","year":"2014","unstructured":"I. J. Goodfellow, J. Shlens, and C. Szegedy, \u201cExplaining and harnessing adversarial examples,\u201d arXiv preprint arXiv:1412.6572, 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_20_1","volume-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"Ioffe S.","year":"2015","unstructured":"S. Ioffe and C. Szegedy, \u201cBatch normalization: Accelerating deep network training by reducing internal covariate shift,\u201d arXiv preprint arXiv:1502.03167, 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"A probabilistic theory of deep learning","author":"Patel A. B.","year":"2015","unstructured":"A. B. Patel, T. Nguyen, and R. G. Baraniuk, \u201cA probabilistic theory of deep learning,\u201d arXiv preprint arXiv:1504.00641, 2015."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045690"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_25_1","volume-title":"The mnist database of handwritten digits","author":"LeCun Y.","year":"1998","unstructured":"Y. LeCun, C. Cortes, and C. J. Burges, \u201cThe mnist database of handwritten digits,\u201d 1998."},{"key":"e_1_3_2_1_26_1","volume-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky A.","year":"2009","unstructured":"A. Krizhevsky and G. Hinton, \u201cLearning multiple layers of features from tiny images,\u201d 2009."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2969239.2969366"},{"key":"e_1_3_2_1_28_1","volume-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding","author":"Han S.","year":"2015","unstructured":"S. Han, H. Mao, and W. J. Dally, \u201cDeep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding,\u201d arXiv preprint arXiv:1510.00149, 2015."},{"key":"e_1_3_2_1_29_1","volume-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan K.","year":"2014","unstructured":"K. Simonyan and A. Zisserman, \u201cVery deep convolutional networks for large-scale image recognition,\u201d arXiv preprint arXiv:1409.1556, 2014."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062225"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934583.2934599"},{"key":"e_1_3_2_1_32_1","volume-title":"Convolutional neural networks for medical image analysis: Full training or fine tuning?","author":"Tajbakhsh N.","unstructured":"N. Tajbakhsh, J. Y. Shin, S. R. Gurudu, R. T. Hurst, C. B. Kendall, M. B. Gotway, and J. Liang, \u201cConvolutional neural networks for medical image analysis: Full training or fine tuning?,\u201d IEEE transactions on medical imaging, vol. 35, no. 5, 2016."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2462810"},{"key":"e_1_3_2_1_34_1","volume-title":"Striving for simplicity: The all convolutional net","author":"Springenberg J. T.","year":"2014","unstructured":"J. T. Springenberg, A. Dosovitskiy, T. Brox, and M. Riedmiller, \u201cStriving for simplicity: The all convolutional net,\u201d arXiv preprint arXiv:1412.6806, 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298958"},{"key":"e_1_3_2_1_36_1","volume-title":"Performance comparison of contemporary dnn watermarking techniques","author":"Chen H.","year":"1811","unstructured":"H. Chen, B. D. Rouhani, X. Fan, O. C. Kilinc, and F. Koushanfar, \u201cPerformance comparison of contemporary dnn watermarking techniques,\u201d arXiv preprint arXiv:1811.03713, 2018."},{"key":"e_1_3_2_1_37_1","volume-title":"Artificial Intelligence and Statistics","author":"Choromanska A.","year":"2015","unstructured":"A. Choromanska, M. Henaff, M. Mathieu, G. B. Arous, and Y. LeCun, \u201cThe loss surfaces of multilayer networks,\u201d in Artificial Intelligence and Statistics, 2015."}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","location":"Providence RI USA","acronym":"ASPLOS '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:15Z","timestamp":1750204395000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304051"}},"subtitle":["An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks"],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":37,"alternative-id":["10.1145\/3297858.3304051","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304051","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}