{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:08:02Z","timestamp":1778256482188,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,5]]},"DOI":"10.1145\/3323873.3325042","type":"proceedings-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T12:10:58Z","timestamp":1560168658000},"page":"105-113","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":161,"title":["DeepMarks"],"prefix":"10.1145","author":[{"given":"Huili","family":"Chen","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Bita Darvish","family":"Rouhani","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Cheng","family":"Fu","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Jishen","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. arXiv preprint arXiv:1802.04633","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi , Carsten Baum , Moustapha Cisse , Benny Pinkas , and Joseph Keshet . 2018. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. arXiv preprint arXiv:1802.04633 ( 2018 ). Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. arXiv preprint arXiv:1802.04633 (2018)."},{"key":"e_1_3_2_1_2_1","unstructured":"Caffe. 2017. Model Zoo. https:\/\/github.com\/BVLC\/caffe\/wiki\/Model-Zoo .  Caffe. 2017. Model Zoo. https:\/\/github.com\/BVLC\/caffe\/wiki\/Model-Zoo ."},{"key":"e_1_3_2_1_3_1","volume-title":"Handbook of combinatorial designs","author":"Colbourn Charles J","unstructured":"Charles J Colbourn and Jeffrey H Dinitz . 2006. Handbook of combinatorial designs . CRC press . Charles J Colbourn and Jeffrey H Dinitz. 2006. Handbook of combinatorial designs .CRC press."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2018.05.054"},{"key":"e_1_3_2_1_5_1","volume-title":"Multimedia security handbook","author":"Furht Borko","unstructured":"Borko Furht and Darko Kirovski . 2004. Multimedia security handbook . CRC press . Borko Furht and Darko Kirovski. 2004. Multimedia security handbook .CRC press."},{"key":"e_1_3_2_1_6_1","unstructured":"Song Han Jeff Pool John Tran and William Dally. 2015. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems. 1135--1143.   Song Han Jeff Pool John Tran and William Dally. 2015. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems. 1135--1143."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771066"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.952740"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2026462"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827356"},{"key":"e_1_3_2_1_11_1","volume-title":"Deep learning. nature","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015. Deep learning. nature , Vol. 521 , 7553 ( 2015 ), 436. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature, Vol. 521, 7553 (2015), 436."},{"key":"e_1_3_2_1_12_1","volume-title":"Adversarial Frontier Stitching for Remote Neural Network Watermarking. arXiv preprint arXiv:1711.01894","author":"Merrer Erwan Le","year":"2017","unstructured":"Erwan Le Merrer , Patrick Perez , and Gilles Tr\u00e9dan . 2017. Adversarial Frontier Stitching for Remote Neural Network Watermarking. arXiv preprint arXiv:1711.01894 ( 2017 ). Erwan Le Merrer, Patrick Perez, and Gilles Tr\u00e9dan. 2017. Adversarial Frontier Stitching for Remote Neural Network Watermarking. arXiv preprint arXiv:1711.01894 (2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-018-0147-1"},{"key":"e_1_3_2_1_14_1","volume-title":"Intellectual property protection in VLSI designs: theory and practice","author":"Qu Gang","unstructured":"Gang Qu and Miodrag Potkonjak . 2007. Intellectual property protection in VLSI designs: theory and practice . Springer Science & Business Media . Gang Qu and Miodrag Potkonjak. 2007. Intellectual property protection in VLSI designs: theory and practice .Springer Science & Business Media."},{"key":"e_1_3_2_1_15_1","first-page":"582","article-title":"Digital fingerprinting track and trace system","volume":"9","author":"Ross David","year":"2017","unstructured":"David Ross , Brian Elmenhurst , Mark Tocci , John Forbes , and Heather Wheelock Ross . 2017 . Digital fingerprinting track and trace system . US Patent 9 , 582 ,714. David Ross, Brian Elmenhurst, Mark Tocci, John Forbes, and Heather Wheelock Ross. 2017. Digital fingerprinting track and trace system. US Patent 9,582,714.","journal-title":"US Patent"},{"key":"e_1_3_2_1_16_1","volume-title":"The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). ACM.","author":"Rouhani Bita Darvish","unstructured":"Bita Darvish Rouhani , Huili Chen , and Farinaz Koushanfar . 2019. DeepSigns: An End-to-End Watermarking Framework for Protecting the Ownership of Deep Neural Networks . In The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). ACM. Bita Darvish Rouhani, Huili Chen, and Farinaz Koushanfar. 2019. DeepSigns: An End-to-End Watermarking Framework for Protecting the Ownership of Deep Neural Networks. In The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). ACM."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_1_18_1","volume-title":"2002 IEEE International Conference on","volume":"4","author":"Trappe Wade","year":"2002","unstructured":"Wade Trappe , Min Wu , and KJ Ray Liu . 2002 . Collusion-resistant fingerprinting for multimedia. In Acoustics, Speech, and Signal Processing (ICASSP) , 2002 IEEE International Conference on , Vol. 4 . IEEE, IV--3309. Wade Trappe, Min Wu, and KJ Ray Liu. 2002. Collusion-resistant fingerprinting for multimedia. In Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on, Vol. 4. IEEE, IV--3309."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809378"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Yusuke Uchida. 2017. Embedding Watermarks into Deep Neural Networks. https:\/\/github.com\/yu4u\/dnn-watermark .  Yusuke Uchida. 2017. Embedding Watermarks into Deep Neural Networks. https:\/\/github.com\/yu4u\/dnn-watermark .","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_22_1","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents VI","author":"Wu Min","unstructured":"Min Wu , Wade Trappe , Z Jane Wang , and KJ Ray Liu . 2004. Collusion-resistant multimedia fingerprinting: a unified framework . In Security, Steganography, and Watermarking of Multimedia Contents VI , Vol. 5306 . International Society for Optics and Photonics , 748--760. Min Wu, Wade Trappe, Z Jane Wang, and KJ Ray Liu. 2004. Collusion-resistant multimedia fingerprinting: a unified framework. In Security, Steganography, and Watermarking of Multimedia Contents VI, Vol. 5306. International Society for Optics and Photonics, 748--760."},{"key":"e_1_3_2_1_23_1","volume-title":"2010 2nd International Conference on. IEEE, 1--5.","author":"Yu Yongsheng","year":"2010","unstructured":"Yongsheng Yu , Hongwei Lu , Xiaosu Chen , and Zhiguang Zhang . 2010 . Group-oriented anti-collusion fingerprint based on bibd code. In e-Business and Information System Security (EBISS) , 2010 2nd International Conference on. IEEE, 1--5. Yongsheng Yu, Hongwei Lu, Xiaosu Chen, and Zhiguang Zhang. 2010. Group-oriented anti-collusion fingerprint based on bibd code. In e-Business and Information System Security (EBISS), 2010 2nd International Conference on. IEEE, 1--5."},{"key":"e_1_3_2_1_24_1","volume-title":"Wide residual networks. arXiv preprint arXiv:1605.07146","author":"Zagoruyko Sergey","year":"2016","unstructured":"Sergey Zagoruyko and Nikos Komodakis . 2016. Wide residual networks. arXiv preprint arXiv:1605.07146 ( 2016 ). Sergey Zagoruyko and Nikos Komodakis. 2016. Wide residual networks. arXiv preprint arXiv:1605.07146 (2016)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"}],"event":{"name":"ICMR '19: International Conference on Multimedia Retrieval","location":"Ottawa ON Canada","acronym":"ICMR '19","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2019 on International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323873.3325042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:12Z","timestamp":1750204452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325042"}},"subtitle":["A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models"],"short-title":[],"issued":{"date-parts":[[2019,6,5]]},"references-count":25,"alternative-id":["10.1145\/3323873.3325042","10.1145\/3323873"],"URL":"https:\/\/doi.org\/10.1145\/3323873.3325042","relation":{},"subject":[],"published":{"date-parts":[[2019,6,5]]},"assertion":[{"value":"2019-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}