{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:49:02Z","timestamp":1770227342914,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2336208,62262002,62302059"],"award-info":[{"award-number":["U2336208,62262002,62302059"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1145\/3733102.3733135","type":"proceedings-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:07Z","timestamp":1750158847000},"page":"114-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Reinforcement Learning-based Copyright Protection Watermarking for Large Language Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9292-933X","authenticated-orcid":false,"given":"Shengnan","family":"Guo","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, beijing, China and Zhongguancun Laboratory, beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0248-171X","authenticated-orcid":false,"given":"Kaiyi","family":"Pang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8027-9560","authenticated-orcid":false,"given":"Zhongliang","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3974-0690","authenticated-orcid":false,"given":"Yamin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Hubei University, Wuhan, China and Department of Electronic Engineering, Tsinghua University, beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2969-6763","authenticated-orcid":false,"given":"Yu","family":"Qing","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3825-2230","authenticated-orcid":false,"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, beijing, China and Zhongguancun Laboratory, beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.423"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26750"},{"key":"e_1_3_3_1_4_2","unstructured":"Sen Peng Yufei Chen Cong Wang and Xiaohua Jia. 2023. Protecting the intellectual property of diffusion models by the watermark diffusion process. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.03436 3 (2023)."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_3_1_6_2","unstructured":"Shuai Li Kejiang Chen Kunsheng Tang Wen Huang Jie Zhang Weiming Zhang and Nenghai Yu. 2023. Functionmarker: watermarking language datasets via knowledge injection. CoRR (2023)."},{"key":"e_1_3_3_1_7_2","unstructured":"Xi Yang Kejiang Chen Weiming Zhang Chang Liu Yuang Qi Jie Zhang Han Fang and Nenghai Yu. 2023. Watermarking Text Generated by Black-Box Language Models. CoRR (2023)."},{"key":"e_1_3_3_1_8_2","unstructured":"Na Zhao Kejiang Chen Weiming Zhang and Nenghai Yu. 2023. Performance-lossless Black-box Model Watermarking. CoRR (2023)."},{"key":"e_1_3_3_1_9_2","first-page":"17061","volume-title":"International Conference on Machine Learning","author":"Kirchenbauer John","year":"2023","unstructured":"John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, and Tom Goldstein. 2023. A watermark for large language models. In International Conference on Machine Learning. PMLR, 17061\u201317084."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Xiaoxuan Lou Shangwei Guo Jiwei Li and Tianwei Zhang. 2022. Ownership verification of dnn architectures via hardware cache side channels. IEEE Transactions on Circuits and Systems for Video Technology 32 11 (2022) 8078\u20138093.","DOI":"10.1109\/TCSVT.2022.3184644"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSF51468.2021.00044"},{"key":"e_1_3_3_1_12_2","first-page":"1937","volume-title":"30th USENIX security symposium (USENIX Security 21)","author":"Jia Hengrui","year":"2021","unstructured":"Hengrui Jia, Christopher\u00a0A Choquette-Choo, Varun Chandrasekaran, and Nicolas Papernot. 2021. Entangled watermarks as a defense against model extraction. In 30th USENIX security symposium (USENIX Security 21). 1937\u20131954."},{"key":"e_1_3_3_1_13_2","first-page":"1615","volume-title":"27th USENIX security symposium (USENIX Security 18)","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th USENIX security symposium (USENIX Security 18). 1615\u20131631."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Erwan Le\u00a0Merrer Patrick Perez and Gilles Tr\u00e9dan. 2020. Adversarial frontier stitching for remote neural network watermarking. Neural Computing and Applications 32 13 (2020) 9233\u20139244.","DOI":"10.1007\/s00521-019-04434-z"},{"key":"e_1_3_3_1_16_2","unstructured":"Xuanli He Qiongkai Xu Yi Zeng Lingjuan Lyu Fangzhao Wu Jiwei Li and Ruoxi Jia. 2022. Cater: Intellectual property protection on text generation apis via conditional watermarks. Advances in Neural Information Processing Systems 35 (2022) 5431\u20135445."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Shuo Shao Yiming Li Hongwei Yao Yiling He Zhan Qin and Kui Ren. 2024. Explanation as a watermark: Towards harmless and multi-bit model ownership verification via watermarking feature attribution. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.04825 (2024).","DOI":"10.14722\/ndss.2025.230338"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Shen Wang Jialiang Dong Longfei Wu and Zhitao Guan. 2024. WEDA: Exploring Copyright Protection for Large Language Model Downstream Alignment. IEEE\/ACM Transactions on Audio Speech and Language Processing (2024).","DOI":"10.1109\/TASLP.2024.3487419"},{"key":"e_1_3_3_1_19_2","unstructured":"John Schulman Filip Wolski Prafulla Dhariwal Alec Radford and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1707.06347 (2017)."},{"key":"e_1_3_3_1_20_2","unstructured":"Edward\u00a0J Hu Yelong Shen Phillip Wallis Zeyuan Allen-Zhu Yuanzhi Li Shean Wang Lu Wang Weizhu Chen et\u00a0al. 2022. Lora: Low-rank adaptation of large language models. ICLR 1 2 (2022) 3."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.319"},{"key":"e_1_3_3_1_22_2","unstructured":"Karl Cobbe Vineet Kosaraju Mohammad Bavarian Mark Chen Heewoo Jun Lukasz Kaiser Matthias Plappert Jerry Tworek Jacob Hilton Reiichiro Nakano et\u00a0al. 2021. Training verifiers to solve math word problems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2110.14168 (2021)."},{"key":"e_1_3_3_1_23_2","unstructured":"Subhro Roy and Dan Roth. 2016. Solving general arithmetic word problems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1608.01413 (2016)."},{"key":"e_1_3_3_1_24_2","unstructured":"A Vaswani. 2017. Attention is all you need. Advances in Neural Information Processing Systems (2017)."},{"key":"e_1_3_3_1_25_2","unstructured":"Hugo Touvron Thibaut Lavril Gautier Izacard Xavier Martinet Marie-Anne Lachaux Timoth\u00e9e Lacroix Baptiste Rozi\u00e8re Naman Goyal Eric Hambro Faisal Azhar et\u00a0al. 2023. Llama: Open and efficient foundation language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2302.13971 (2023)."},{"key":"e_1_3_3_1_26_2","unstructured":"Albert\u00a0Q Jiang A Sablayrolles A Mensch C Bamford D\u00a0Singh Chaplot Ddl Casas F Bressand G Lengyel G Lample L Saulnier et\u00a0al. 2023. Mistral 7b. arxiv. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2310.06825 10 (2023)."}],"event":{"name":"IH&MMSEC '25: ACM Workshop on Information Hiding and Multimedia Security","location":"San Jose USA","acronym":"IH&MMSEC '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T11:14:14Z","timestamp":1750158854000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733102.3733135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":25,"alternative-id":["10.1145\/3733102.3733135","10.1145\/3733102"],"URL":"https:\/\/doi.org\/10.1145\/3733102.3733135","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-06-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}