{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T01:56:33Z","timestamp":1771034193604,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202340"],"award-info":[{"award-number":["62202340"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3100700"],"award-info":[{"award-number":["2021YFB3100700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Wuhan Knowledge Innovation Program","award":["2022010801020127"],"award-info":[{"award-number":["2022010801020127"]}]},{"DOI":"10.13039\/100020593","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2042023kf0121"],"award-info":[{"award-number":["2042023kf0121"]}],"id":[{"id":"10.13039\/100020593","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness","award":["HNTS2022004"],"award-info":[{"award-number":["HNTS2022004"]}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2021CFB089"],"award-info":[{"award-number":["2021CFB089"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1145\/3581783.3612331","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T07:26:54Z","timestamp":1698391614000},"page":"8463-8474","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2842-5137","authenticated-orcid":false,"given":"Run","family":"Wang","sequence":"first","affiliation":[{"name":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4433-0648","authenticated-orcid":false,"given":"Jixing","family":"Ren","sequence":"additional","affiliation":[{"name":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9921-7215","authenticated-orcid":false,"given":"Boheng","family":"Li","sequence":"additional","affiliation":[{"name":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4623-1384","authenticated-orcid":false,"given":"Tianyi","family":"She","sequence":"additional","affiliation":[{"name":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7458-3494","authenticated-orcid":false,"given":"Wenhui","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1420-2047","authenticated-orcid":false,"given":"Liming","family":"Fang","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics &amp; Shenzhen Research Institute, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7212-5297","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8085-1312","authenticated-orcid":false,"given":"Lina","family":"Wang","sequence":"additional","affiliation":[{"name":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University &amp; Zhengzhou Xinda Institute of Advanced Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"27th $$USENIX$$ Security Symposium ({USENIX} Security 18). 1615--1631.","author":"Adi Yossi","unstructured":"Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th $$USENIX$$ Security Symposium ({USENIX} Security 18). 1615--1631."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460399"},{"key":"e_1_3_2_2_3_1","volume-title":"A survey on model watermarking neural networks. arXiv preprint arXiv:2009.12153","author":"Boenisch Franziska","year":"2020","unstructured":"Franziska Boenisch. 2020. A survey on model watermarking neural networks. arXiv preprint arXiv:2009.12153 (2020)."},{"key":"e_1_3_2_2_4_1","unstructured":"Rishi Bommasani Drew A Hudson Ehsan Adeli Russ Altman Simran Arora Sydney von Arx Michael S Bernstein Jeannette Bohg Antoine Bosselut Emma Brunskill et al. 2021. On the Opportunities and Risks of Foundation Models. arXiv preprint arXiv:2108.07258 (2021)."},{"key":"e_1_3_2_2_5_1","unstructured":"Tom B Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. arXiv preprint arXiv:2005.14165 (2020)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833747"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453079"},{"key":"e_1_3_2_2_8_1","volume-title":"Diffusion models beat gans on image synthesis. arXiv preprint arXiv:2105.05233","author":"Dhariwal Prafulla","year":"2021","unstructured":"Prafulla Dhariwal and Alex Nichol. 2021. Diffusion models beat gans on image synthesis. arXiv preprint arXiv:2105.05233 (2021)."},{"key":"e_1_3_2_2_9_1","unstructured":"Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly et al. 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)."},{"key":"e_1_3_2_2_10_1","volume-title":"Kam Woh Ng, and Chee Seng Chan","author":"Fan Lixin","year":"2019","unstructured":"Lixin Fan, Kam Woh Ng, and Chee Seng Chan. 2019. Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks. (2019)."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3088846"},{"key":"e_1_3_2_2_12_1","volume-title":"Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses","author":"Goldblum Micah","year":"2022","unstructured":"Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, and Tom Goldstein. 2022. Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3578741.3578832"},{"key":"e_1_3_2_2_14_1","volume-title":"Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models. arxiv","author":"Guo Shangwei","year":"2009","unstructured":"Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, and Yang Liu. 2021. Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models. arxiv: 2009.08697 [cs.CR]"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_16_1","unstructured":"Geoffrey Hinton Oriol Vinyals Jeff Dean et al. 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 Vol. 2 7 (2015)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00462"},{"key":"e_1_3_2_2_18_1","volume-title":"USENIX Security Symposium. 1937--1954","author":"Jia Hengrui","year":"2021","unstructured":"Hengrui Jia, Christopher A Choquette-Choo, Varun Chandrasekaran, and Nicolas Papernot. 2021. Entangled Watermarks as a Defense against Model Extraction.. In USENIX Security Symposium. 1937--1954."},{"key":"e_1_3_2_2_19_1","volume-title":"Ankur P Parikh, Nicolas Papernot, and Mohit Iyyer.","author":"Krishna Kalpesh","year":"2019","unstructured":"Kalpesh Krishna, Gaurav Singh Tomar, Ankur P Parikh, Nicolas Papernot, and Mohit Iyyer. 2019. Thieves on sesame street! model extraction of bert-based apis. arXiv preprint arXiv:1910.12366 (2019)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i9.21193"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00714"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01541-0"},{"key":"e_1_3_2_2_24_1","volume-title":"Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification. In Information Security Applications: 23rd International Conference, WISA 2022","author":"Li Wei","year":"2023","unstructured":"Wei Li, Xiaoyu Zhang, Shen Lin, Xinbo Ban, and Xiaofeng Chen. 2023 a. Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification. In Information Security Applications: 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers. Springer, 344--356."},{"key":"e_1_3_2_2_25_1","unstructured":"Yiming Li Yang Bai Yong Jiang Yong Yang Shu-Tao Xia and Bo Li. 2022a. Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection. In NeurIPS."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.07.051"},{"key":"e_1_3_2_2_27_1","unstructured":"Yiming Li Linghui Zhu Xiaojun Jia Yong Jiang Shu-Tao Xia and Xiaochun Cao. 2022c. Defending against Model Stealing via Verifying Embedded External Features. In AAAI."},{"key":"e_1_3_2_2_28_1","volume-title":"2023 b. Black-box Dataset Ownership Verification via Backdoor Watermarking","author":"Li Yiming","year":"2023","unstructured":"Yiming Li, Mingyan Zhu, Xue Yang, Yong Jiang, Tao Wei, and Shu-Tao Xia. 2023 b. Black-box Dataset Ownership Verification via Backdoor Watermarking. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351025"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833693"},{"key":"e_1_3_2_2_32_1","volume-title":"SVD Mark: A Novel Black-Box Watermarking for Protecting Intellectual Property of Deep Neural Network Model. In International Conference on Artificial Intelligence and Security. Springer, 390--410","author":"Lv Haojie","year":"2022","unstructured":"Haojie Lv, Shuyuan Shen, Huanjie Lin, Yibo Yuan, and Delin Duan. 2022. SVD Mark: A Novel Black-Box Watermarking for Protecting Intellectual Property of Deep Neural Network Model. In International Conference on Artificial Intelligence and Security. Springer, 390--410."},{"key":"e_1_3_2_2_33_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_2_34_1","volume-title":"Dataset Inference: Ownership Resolution in Machine Learning. In International Conference on Learning Representations.","author":"Maini Pratyush","year":"2020","unstructured":"Pratyush Maini, Mohammad Yaghini, and Nicolas Papernot. 2020. Dataset Inference: Ownership Resolution in Machine Learning. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_35_1","volume-title":"Joon Son Chung, and Andrew Zisserman","author":"Nagrani Arsha","year":"2017","unstructured":"Arsha Nagrani, Joon Son Chung, and Andrew Zisserman. 2017. VoxCeleb: a large-scale speaker identification dataset. In INTERSPEECH."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00363"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01307"},{"key":"e_1_3_2_2_39_1","volume-title":"A Novel Model Watermarking for Protecting Generative Adversarial Network. Computers & Security","author":"Qiao Tong","year":"2023","unstructured":"Tong Qiao, Yuyan Ma, Ning Zheng, Hanzhou Wu, Yanli Chen, Ming Xu, and Xiangyang Luo. 2023. A Novel Model Watermarking for Protecting Generative Adversarial Network. Computers & Security (2023), 103102."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-021-1186-y"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475591"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Lisa Torrey and Jude Shavlik. 2010. Transfer learning. In Handbook of research on machine learning applications and trends: algorithms methods and techniques. IGI global 242--264.","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"e_1_3_2_2_43_1","volume-title":"International Conference on Learning Representations.","author":"Wang Lixu","year":"2021","unstructured":"Lixu Wang, Shichao Xu, Ruiqi Xu, Xiao Wang, and Qi Zhu. 2021. Non-transferable learning: A new approach for model ownership verification and applicability authorization. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548390"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682202"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450000"},{"key":"e_1_3_2_2_47_1","volume-title":"International Conference on Learning Representations.","author":"Xiao Kai Yuanqing","year":"2020","unstructured":"Kai Yuanqing Xiao, Logan Engstrom, Andrew Ilyas, and Aleksander Madry. 2020. Noise or Signal: The Role of Image Backgrounds in Object Recognition. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_48_1","volume-title":"Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155","author":"Xu Weilin","year":"2017","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 (2017)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/109"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"Sheng Yang Yiming Li Yong Jiang and Shu-Tao Xia. 2023. Backdoor Defense via Suppressing Model Shortcuts. In ICASSP.","DOI":"10.1109\/ICASSP49357.2023.10097220"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging8060152"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475628"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.016"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3198267"},{"key":"e_1_3_2_2_56_1","volume-title":"Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. In 2022 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 1--6.","author":"Zhong Qi","year":"2022","unstructured":"Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, and Yong Xiang. 2022. Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. In 2022 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 1--6."}],"event":{"name":"MM '23: The 31st ACM International Conference on Multimedia","location":"Ottawa ON Canada","acronym":"MM '23","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 31st ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612331","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581783.3612331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T23:59:14Z","timestamp":1755820754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":56,"alternative-id":["10.1145\/3581783.3612331","10.1145\/3581783"],"URL":"https:\/\/doi.org\/10.1145\/3581783.3612331","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"2023-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}