{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:19:34Z","timestamp":1763018374937,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Government's Cooperative Research Centres Programme"},{"name":"National Research Foundation of Korea (NRF) by the Korea government (MSIT)","award":["2019R1C1C1007118"],"award-info":[{"award-number":["2019R1C1C1007118"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3441970","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:09:42Z","timestamp":1619154582000},"page":"952-959","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["DeepiSign"],"prefix":"10.1145","author":[{"given":"Alsharif","family":"Abuadbba","sequence":"first","affiliation":[{"name":"Data61, Australia"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Data61, Australia and Sungkyunkwan University, South Korea"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"Data61, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 1615--1631.","author":"Adi Yossi","unstructured":"Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1615--1631.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"Digital image steganography: Survey and analysis of current methods. Signal processing 90, 3","author":"Cheddad Abbas","year":"2010","unstructured":"Abbas Cheddad, Joan Condell, Kevin Curran, and Paul Mc Kevitt. 2010. Digital image steganography: Survey and analysis of current methods. Signal processing 90, 3 (2010), 727--752."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/ICCV.2015.312"},{"key":"e_1_3_2_1_4_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_6_1","first-page":"4752","article-title":"Survey on universal image steganalysis","volume":"5","author":"Desai Madhavi B","year":"2014","unstructured":"Madhavi B Desai and S Patel. 2014. Survey on universal image steganalysis. International Journal of Computer Science and Information Technologies 5, 3 (2014), 4752--4759.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_2_1_7_1","volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733","author":"Gu Tianyu","year":"2017","unstructured":"Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_9_1","volume-title":"Verideep: Verifying integrity of deep neural networks through sensitive-sample fingerprinting. arXiv preprint arXiv:1808.03277","author":"He Zecheng","year":"2018","unstructured":"Zecheng He, Tianwei Zhang, and Ruby B Lee. 2018. Verideep: Verifying integrity of deep neural networks through sensitive-sample fingerprinting. arXiv preprint arXiv:1808.03277 (2018)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/TBME.2013.2264539"},{"unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.","key":"e_1_3_2_1_12_1"},{"unstructured":"Yann LeCun LD Jackel L\u00e9on Bottou Corinna Cortes John S Denker Harris Drucker Isabelle Guyon Urs A Muller Eduard Sackinger Patrice Simard et al. 1995. Learning algorithms for classification: A comparison on handwritten digit recognition. aNeural networks: the statistical mechanics perspective 261 (1995) 276.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TASLP.2017.2676356"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICCD.2017.16"},{"key":"e_1_3_2_1_16_1","volume-title":"Adversarial frontier stitching for remote neural network watermarking. arXiv preprint arXiv:1711.01894","author":"Merrer Erwan Le","year":"2017","unstructured":"Erwan Le Merrer, Patrick Perez, and Gilles Tr\u00e9dan. 2017. Adversarial frontier stitching for remote neural network watermarking. arXiv preprint arXiv:1711.01894 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/s13735-018-0147-1"},{"key":"e_1_3_2_1_18_1","first-page":"212","article-title":"A wavelet-based data compression technique for smart grid. aSmart Grid","volume":"2","author":"Ning Jiaxin","year":"2011","unstructured":"Jiaxin Ning, Jianhui Wang, Wenzhong Gao, and Cong Liu. 2011. A wavelet-based data compression technique for smart grid. aSmart Grid, IEEE Transactions on 2, 1 (2011), 212--218.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_19_1","volume-title":"Deepsigns: A generic watermarking framework for ip protection of deep learning models. arXiv preprint arXiv:1804.00750","author":"Rouhani Bita Darvish","year":"2018","unstructured":"Bita Darvish Rouhani, Huili Chen, and Farinaz Koushanfar. 2018. Deepsigns: A generic watermarking framework for ip protection of deep learning models. arXiv preprint arXiv:1804.00750 (2018)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/CVPR.2018.00474"},{"volume-title":"Neural Lander: Stable Drone Landing Control Using Learned Dynamics. In 2019 International Conference on Robotics and Automation (ICRA). 9784--9790","author":"Shi G.","unstructured":"G. Shi, X. Shi, M. O'Connell, R. Yu, K. Azizzadenesheli, A. Anandkumar, Y. Yue, and S. Chung. 2019. Neural Lander: Stable Drone Landing Control Using Learned Dynamics. In 2019 International Conference on Robotics and Automation (ICRA). 9784--9790.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/3078971.3078974"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/SP.2019.00031"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.14722\/ndss.2018.23291"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/3196494.3196550"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"acronym":"SAC '21","name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","location":"Virtual Event Republic of Korea"},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3441970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:24Z","timestamp":1750195464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441970"}},"subtitle":["invisible fragile watermark to protect the integrity and authenticity of CNN"],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":25,"alternative-id":["10.1145\/3412841.3441970","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3441970","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}