{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:11:10Z","timestamp":1766268670737,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Open Research Fund from Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ)","award":["GML-KF-22-28"],"award-info":[{"award-number":["GML-KF-22-28"]}]},{"name":"Open Fund of National Engineering Laboratory for Big Data System Computing Technology","award":["SZU-BDSC-OF2024-14"],"award-info":[{"award-number":["SZU-BDSC-OF2024-14"]}]},{"DOI":"10.13039\/501100006374","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515012685; 2023A1515011296"],"award-info":[{"award-number":["2023A1515012685; 2023A1515011296"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1145\/3652583.3658058","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T06:30:40Z","timestamp":1717741840000},"page":"129-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["MarginFinger: Controlling Generated Fingerprint Distance to Classification boundary Using Conditional GANs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7604-637X","authenticated-orcid":false,"given":"Weixing","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University &amp; Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7524-5999","authenticated-orcid":false,"given":"Shenghua","family":"Zhong","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen Unviersity, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th USENIX Security Symposium (USENIX Security 18). 1615--1631."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Arash Afkanpour Shabir Adeel Hansenclever Bassani Arkady Epshteyn Hongbo Fan Isaac Jones Mahan Malihi Adrian Nauth Raj Sinha Sanjana Woonna et al. 2022. BERT for Long Documents: A Case Study of Automated ICD Coding. arXiv preprint arXiv:2211.02519 (2022).","DOI":"10.18653\/v1\/2022.louhi-1.12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437526"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325042"},{"key":"e_1_3_2_1_5_1","volume-title":"Bita Darvish Rouhani, and Farinaz Koushanfar","author":"Chen Huili","year":"2019","unstructured":"Huili Chen, Bita Darvish Rouhani, and Farinaz Koushanfar. 2019a. Blackmarks: Blackbox multibit watermarking for deep neural networks. arXiv preprint arXiv:1904.00344 (2019)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25860"},{"key":"e_1_3_2_1_7_1","volume-title":"A guide to deep learning in healthcare. Nature medicine","author":"Esteva Andre","year":"2019","unstructured":"Andre Esteva, Alexandre Robicquet, Bharath Ramsundar, Volodymyr Kuleshov, Mark DePristo, Katherine Chou, Claire Cui, Greg Corrado, Sebastian Thrun, and Jeff Dean. 2019. A guide to deep learning in healthcare. Nature medicine, Vol. 25, 1 (2019), 24--29."},{"key":"e_1_3_2_1_8_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_9_1","first-page":"36571","article-title":"Are you stealing my model? sample correlation for fingerprinting deep neural networks","volume":"35","author":"Guan Jiyang","year":"2022","unstructured":"Jiyang Guan, Jian Liang, and Ran He. 2022. Are you stealing my model? sample correlation for fingerprinting deep neural networks. Advances in Neural Information Processing Systems , Vol. 35 (2022), 36571--36584.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413729"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"volume-title":"29th USENIX security symposium (USENIX Security 20). 1345--1362.","author":"Jagielski Matthew","key":"e_1_3_2_1_13_1","unstructured":"Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot. 2020. High accuracy and high fidelity extraction of neural networks. In 29th USENIX security symposium (USENIX Security 20). 1345--1362."},{"key":"e_1_3_2_1_14_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00104"},{"key":"e_1_3_2_1_16_1","volume-title":"Tiny imagenet visual recognition challenge. CS 231N","author":"Le Ya","year":"2015","unstructured":"Ya Le and Xuan Yang. 2015. Tiny imagenet visual recognition challenge. CS 231N, Vol. 7, 7 (2015), 3."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464816"},{"key":"e_1_3_2_1_19_1","unstructured":"Hanwen Liu Zhenyu Weng and Yuesheng Zhu. 2021. Watermarking Deep Neural Networks with Greedy Residuals.. In ICML. 6978--6988."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00302"},{"key":"e_1_3_2_1_22_1","volume-title":"Deep neural network fingerprinting by conferrable adversarial examples. arXiv preprint arXiv:1912.00888","author":"Lukas Nils","year":"2019","unstructured":"Nils Lukas, Yuxuan Zhang, and Florian Kerschbaum. 2019. Deep neural network fingerprinting by conferrable adversarial examples. arXiv preprint arXiv:1912.00888 (2019)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329808"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539257"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01307"},{"key":"e_1_3_2_1_28_1","volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434","author":"Radford Alec","year":"2015","unstructured":"Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623325"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_31_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"e_1_3_2_1_33_1","volume-title":"Deep Intellectual Property: A Survey. arXiv preprint arXiv:2304.14613","author":"Sun Yuchen","year":"2023","unstructured":"Yuchen Sun, Tianpeng Liu, Panhe Hu, Qing Liao, Shouling Ji, Nenghai Yu, Deke Guo, and Li Liu. 2023. Deep Intellectual Property: A Survey. arXiv preprint arXiv:2304.14613 (2023)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401119"},{"key":"e_1_3_2_1_36_1","volume-title":"NaturalFinger: Generating Natural Fingerprint with Generative Adversarial Networks. arXiv preprint arXiv:2305.17868","author":"Yang Kang","year":"2023","unstructured":"Kang Yang and Kunhao Lai. 2023. NaturalFinger: Generating Natural Fingerprint with Generative Adversarial Networks. arXiv preprint arXiv:2305.17868 (2023)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47436-2_35"}],"event":{"name":"ICMR '24: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Phuket Thailand","acronym":"ICMR '24"},"container-title":["Proceedings of the 2024 International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652583.3658058","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652583.3658058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T08:49:33Z","timestamp":1755766173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652583.3658058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":37,"alternative-id":["10.1145\/3652583.3658058","10.1145\/3652583"],"URL":"https:\/\/doi.org\/10.1145\/3652583.3658058","relation":{},"subject":[],"published":{"date-parts":[[2024,5,30]]},"assertion":[{"value":"2024-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}