{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:10:33Z","timestamp":1775913033760,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3450000","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:24:51Z","timestamp":1622748291000},"page":"993-1004","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":88,"title":["RIGA: Covert and Robust White-Box Watermarking of Deep Neural Networks"],"prefix":"10.1145","author":[{"given":"Tianhao","family":"Wang","sequence":"first","affiliation":[{"name":"Harvard University, USA"}]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security). 1615\u20131631","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi , Carsten Baum , Moustapha Ciss\u00e9 , Benny Pinkas , and Joseph Keshet . 2018 . Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring . In Proceedings of the 27th USENIX Security Symposium (USENIX Security). 1615\u20131631 . Yossi Adi, Carsten Baum, Moustapha Ciss\u00e9, Benny Pinkas, and Joseph Keshet. 2018. Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. In Proceedings of the 27th USENIX Security Symposium (USENIX Security). 1615\u20131631."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"William Aiken Hyoungshick Kim and Simon Woo. 2020. Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks. arXiv preprint arXiv:2004.11368(2020).  William Aiken Hyoungshick Kim and Simon Woo. 2020. Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks. arXiv preprint arXiv:2004.11368(2020).","DOI":"10.1016\/j.cose.2021.102277"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305381.3305404"},{"key":"e_1_3_2_1_4_1","volume-title":"Statistics for high-dimensional data: methods, theory and applications","author":"B\u00fchlmann Peter","unstructured":"Peter B\u00fchlmann and Sara Van De\u00a0Geer . 2011. Statistics for high-dimensional data: methods, theory and applications . Springer Science & Business Media . Peter B\u00fchlmann and Sara Van De\u00a0Geer. 2011. Statistics for high-dimensional data: methods, theory and applications. Springer Science & Business Media."},{"key":"e_1_3_2_1_5_1","unstructured":"Huili Chen Bita\u00a0Darvish Rouhani and Farinaz Koushanfar. 2019. BlackMarks: Blackbox Multibit Watermarking for Deep Neural Networks. CoRR abs\/1904.00344(2019).  Huili Chen Bita\u00a0Darvish Rouhani and Farinaz Koushanfar. 2019. BlackMarks: Blackbox Multibit Watermarking for Deep Neural Networks. CoRR abs\/1904.00344(2019)."},{"key":"e_1_3_2_1_6_1","unstructured":"Xinyun Chen Wenxiao Wang Chris Bender Yiming Ding Ruoxi Jia Bo Li and Dawn Song. 2019. REFIT: a Unified Watermark Removal Framework for Deep Learning Systems with Limited Data. arXiv preprint arXiv:1911.07205(2019).  Xinyun Chen Wenxiao Wang Chris Bender Yiming Ding Ruoxi Jia Bo Li and Dawn Song. 2019. REFIT: a Unified Watermark Removal Framework for Deep Learning Systems with Limited Data. arXiv preprint arXiv:1911.07205(2019)."},{"key":"e_1_3_2_1_7_1","volume-title":"Dermatologist-level classification of skin cancer with deep neural networks. Nature 542, 7639","author":"Esteva Andre","year":"2017","unstructured":"Andre Esteva , Brett Kuprel , Roberto\u00a0 A Novoa , Justin Ko , Susan\u00a0 M Swetter , Helen\u00a0 M Blau , and Sebastian Thrun . 2017. Dermatologist-level classification of skin cancer with deep neural networks. Nature 542, 7639 ( 2017 ), 115. Andre Esteva, Brett Kuprel, Roberto\u00a0A Novoa, Justin Ko, Susan\u00a0M Swetter, Helen\u00a0M Blau, and Sebastian Thrun. 2017. Dermatologist-level classification of skin cancer with deep neural networks. Nature 542, 7639 (2017), 115."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243834"},{"key":"e_1_3_2_1_9_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672\u20132680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672\u20132680."},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in Neural Information Processing Systems, C.\u00a0Cortes, N.\u00a0Lawrence, D.\u00a0Lee, M.\u00a0Sugiyama, and R.\u00a0Garnett (Eds.), Vol.\u00a028. Curran Associates","author":"Han Song","year":"2015","unstructured":"Song Han , Jeff Pool , John Tran , and William Dally . 2015. Learning both Weights and Connections for Efficient Neural Network . In Advances in Neural Information Processing Systems, C.\u00a0Cortes, N.\u00a0Lawrence, D.\u00a0Lee, M.\u00a0Sugiyama, and R.\u00a0Garnett (Eds.), Vol.\u00a028. Curran Associates , Inc ., 1135\u20131143. https:\/\/proceedings.neurips.cc\/paper\/ 2015 \/file\/ae0eb3eed39d2bcef4622b2499a05fe6-Paper.pdf Song Han, Jeff Pool, John Tran, and William Dally. 2015. Learning both Weights and Connections for Efficient Neural Network. In Advances in Neural Information Processing Systems, C.\u00a0Cortes, N.\u00a0Lawrence, D.\u00a0Lee, M.\u00a0Sugiyama, and R.\u00a0Garnett (Eds.), Vol.\u00a028. Curran Associates, Inc., 1135\u20131143. https:\/\/proceedings.neurips.cc\/paper\/2015\/file\/ae0eb3eed39d2bcef4622b2499a05fe6-Paper.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"Geoffrey\u00a0E. Hinton Oriol Vinyals and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. CoRR abs\/1503.02531(2015).  Geoffrey\u00a0E. Hinton Oriol Vinyals and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. CoRR abs\/1503.02531(2015)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2019.8768572"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P). 512\u2013527","author":"Juuti Mika","unstructured":"Mika Juuti , Sebastian Szyller , Samuel Marchal , and N. Asokan . 2019. PRADA: Protecting Against DNN Model Stealing Attacks . In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P). 512\u2013527 . Mika Juuti, Sebastian Szyller, Samuel Marchal, and N. Asokan. 2019. PRADA: Protecting Against DNN Model Stealing Attacks. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P). 512\u2013527."},{"key":"e_1_3_2_1_14_1","volume-title":"\u00a0P. Petitcolas","author":"Katzenbeisser Stefan","year":"2015","unstructured":"Stefan Katzenbeisser and Fabien A . \u00a0P. Petitcolas . 2015 . Information Hiding. Artech House . Stefan Katzenbeisser and Fabien A.\u00a0P. Petitcolas. 2015. Information Hiding. Artech House."},{"key":"e_1_3_2_1_15_1","volume-title":"Classification and diagnostic prediction of cancers using gene expression profiling and artificial neural networks. Nature medicine 7, 6","author":"Khan Javed","year":"2001","unstructured":"Javed Khan , Jun\u00a0 S Wei , Markus Ringner , Lao\u00a0 H Saal , Marc Ladanyi , Frank Westermann , Frank Berthold , Manfred Schwab , Cristina\u00a0 R Antonescu , Carsten Peterson , 2001. Classification and diagnostic prediction of cancers using gene expression profiling and artificial neural networks. Nature medicine 7, 6 ( 2001 ), 673. Javed Khan, Jun\u00a0S Wei, Markus Ringner, Lao\u00a0H Saal, Marc Ladanyi, Frank Westermann, Frank Berthold, Manfred Schwab, Cristina\u00a0R Antonescu, Carsten Peterson, 2001. Classification and diagnostic prediction of cancers using gene expression profiling and artificial neural networks. Nature medicine 7, 6 (2001), 673."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"e_1_3_2_1_17_1","unstructured":"Huiying Li Emily Wenger Ben\u00a0Y Zhao and Haitao Zheng. 2019. Piracy Resistant Watermarks for Deep Neural Networks. arXiv preprint arXiv:1910.01226(2019).  Huiying Li Emily Wenger Ben\u00a0Y Zhao and Haitao Zheng. 2019. Piracy Resistant Watermarks for Deep Neural Networks. arXiv preprint arXiv:1910.01226(2019)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359801"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_1_20_1","unstructured":"Xuankai Liu Fengting Li Bihan Wen and Qi Li. 2020. Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. arXiv preprint arXiv:2008.00407(2020).  Xuankai Liu Fengting Li Bihan Wen and Qi Li. 2020. Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. arXiv preprint arXiv:2008.00407(2020)."},{"key":"e_1_3_2_1_21_1","volume-title":"Large-scale celebfaces attributes (celeba) dataset. Retrieved August 15(2018)","author":"Liu Ziwei","year":"2018","unstructured":"Ziwei Liu , Ping Luo , Xiaogang Wang , and Xiaoou Tang . 2018. Large-scale celebfaces attributes (celeba) dataset. Retrieved August 15(2018) , 2018 . Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2018. Large-scale celebfaces attributes (celeba) dataset. Retrieved August 15(2018), 2018."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488466"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.398"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304051"},{"key":"e_1_3_2_1_25_1","unstructured":"Masoumeh Shafieinejad Jiaqi Wang Nils Lukas and Florian Kerschbaum. 2019. On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks. CoRR abs\/1906.07745(2019).  Masoumeh Shafieinejad Jiaqi Wang Nils Lukas and Florian Kerschbaum. 2019. On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks. CoRR abs\/1906.07745(2019)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_27_1","volume-title":"DAWN: Dynamic Adversarial Watermarking of Neural Networks. CoRR abs\/1906.00830(2019).","author":"Szyller Sebastian","year":"2019","unstructured":"Sebastian Szyller , Buse\u00a0Gul Atli , Samuel Marchal , and N. Asokan . 2019 . DAWN: Dynamic Adversarial Watermarking of Neural Networks. CoRR abs\/1906.00830(2019). Sebastian Szyller, Buse\u00a0Gul Atli, Samuel Marchal, and N. Asokan. 2019. DAWN: Dynamic Adversarial Watermarking of Neural Networks. CoRR abs\/1906.00830(2019)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_29_1","volume-title":"Attacks on Digital Watermarks for Deep Neural Networks. In ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2622\u20132626","author":"Wang T.","year":"2019","unstructured":"T. Wang and F. Kerschbaum . 2019 . Attacks on Digital Watermarks for Deep Neural Networks. In ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2622\u20132626 . https:\/\/doi.org\/10.1109\/ICASSP. 2019 .8682202 T. Wang and F. Kerschbaum. 2019. Attacks on Digital Watermarks for Deep Neural Networks. In ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2622\u20132626. https:\/\/doi.org\/10.1109\/ICASSP.2019.8682202"},{"key":"e_1_3_2_1_30_1","unstructured":"Ziqi Yang Hung Dang and Ee-Chien Chang. 2019. Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking. CoRR abs\/1906.06046(2019).  Ziqi Yang Hung Dang and Ee-Chien Chang. 2019. Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking. CoRR abs\/1906.06046(2019)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"}],"event":{"name":"WWW '21: The Web Conference 2021","location":"Ljubljana Slovenia","acronym":"WWW '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3450000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:45Z","timestamp":1750195485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450000"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":31,"alternative-id":["10.1145\/3442381.3450000","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3450000","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}