{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T20:00:52Z","timestamp":1765310452734,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","funder":[{"name":"National Key R&D Program of China","award":["2024YFB4303400"],"award-info":[{"award-number":["2024YFB4303400"]}]},{"name":"Shaanxi Province Science Foundation Fund","award":["2025JC-YBQN-902, 2025JC-YBON-892"],"award-info":[{"award-number":["2025JC-YBQN-902, 2025JC-YBON-892"]}]},{"name":"Fundamental Research Funds for the Central Universities, CHD","award":["XJ2024004401, 300102404301"],"award-info":[{"award-number":["XJ2024004401, 300102404301"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172331"],"award-info":[{"award-number":["62172331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2025A1515010267"],"award-info":[{"award-number":["2025A1515010267"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3755177","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:39:06Z","timestamp":1761377946000},"page":"7864-7873","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-Model Watermarking via Discriminative Samples for Secure Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0518-625X","authenticated-orcid":false,"given":"Juan","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Data Science and Artificial Intelligence, Chang'an University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7984-1448","authenticated-orcid":false,"given":"Yudao","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1590-2587","authenticated-orcid":false,"given":"Zhihai","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Data Science and Artificial Intelligence, Chang'an University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7191-7348","authenticated-orcid":false,"given":"Cai","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0779-167X","authenticated-orcid":false,"given":"Hongji","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7922-7954","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9059-330X","authenticated-orcid":false,"given":"Jianxin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Business and Law, Edith Cowan University, Perth, Western Australia, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"volume-title":"27th USENIX security symposium (USENIX Security . 1615--1631.","author":"Adi Yossi","key":"e_1_3_2_2_1_1","unstructured":"Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th USENIX security symposium (USENIX Security . 1615--1631."},{"key":"e_1_3_2_2_2_1","volume-title":"TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking. Engineering Science and Technology, an International Journal 56","author":"Aminuddin Afrig","year":"2024","unstructured":"Afrig Aminuddin, Ferda Ernawan, Danakorn Nincarean, Agit Amrullah, and Dhani Ariatmanto. 2024. TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking. Engineering Science and Technology, an International Journal 56 (2024), 101790."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.06.073"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548168"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3638531"},{"key":"e_1_3_2_2_7_1","volume-title":"Kam Woh Ng, and Chee Seng Chan","author":"Fan Lixin","year":"2019","unstructured":"Lixin Fan, Kam Woh Ng, and Chee Seng Chan. 2019. Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00438"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000196"},{"key":"e_1_3_2_2_10_1","volume-title":"Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR.","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413729"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118730"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3696409.3700284"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00122-021-03782-6"},{"key":"e_1_3_2_2_15_1","volume-title":"Subnetwork-lossless robust watermarking for hostile theft attacks in deep transfer learning models","author":"Jia Ju","year":"2022","unstructured":"Ju Jia, Yueming Wu, Anran Li, Siqi Ma, and Yang Liu. 2022. Subnetwork-lossless robust watermarking for hostile theft attacks in deep transfer learning models. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626232.3653268"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i9.21193"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108285"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3657282"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3384416"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2024.3351116"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00363"},{"key":"e_1_3_2_2_24_1","volume-title":"ModelShield: Adaptive and Robust Watermark against Model Extraction Attack","author":"Pang Kaiyi","year":"2025","unstructured":"Kaiyi Pang, Tao Qi, ChuhanWu, Minhao Bai, Minghu Jiang, and Yongfeng Huang. 2025. ModelShield: Adaptive and Robust Watermark against Model Extraction Attack. IEEE Transactions on Information Forensics and Security (2025)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2969464"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-022-01113-3"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01657-1"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460401"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612515"},{"key":"e_1_3_2_2_30_1","volume-title":"Deep Serial Number: Computational Watermark for DNN Intellectual Property Protection. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 157--173","author":"Tang Ruixiang","year":"2023","unstructured":"Ruixiang Tang, Mengnan Du, and Xia Hu. 2023. Deep Serial Number: Computational Watermark for DNN Intellectual Property Protection. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 157--173."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3361451"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548390"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3650205"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681138"},{"key":"e_1_3_2_2_36_1","volume-title":"Invisible DNN Watermarking Against Model Extraction Attack","author":"Xi Zuping","year":"2024","unstructured":"Zuping Xi, Zuomin Qu,Wei Lu, Xiangyang Luo, and Xiaochun Cao. 2024. Invisible DNN Watermarking Against Model Extraction Attack. IEEE Transactions on Cybernetics (2024)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548247"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01457"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897413"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612032"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2024.3372373"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121315"},{"key":"e_1_3_2_2_43_1","first-page":"22619","article-title":"Passport-aware normalization for deep model protection","volume":"33","author":"Zhang Jie","year":"2020","unstructured":"Jie Zhang, Dongdong Chen, Jing Liao, Weiming Zhang, Gang Hua, and Nenghai Yu. 2020. Passport-aware normalization for deep model protection. Advances in Neural Information Processing Systems 33 (2020), 22619--22628.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612270"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3225668"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3092555"},{"key":"e_1_3_2_2_47_1","volume-title":"Engineering and Management: 14th International Conference, KSEM 2021, Tokyo, Japan, August 14--16, 2021, Proceedings, Part I 14","author":"Zhu Renjie","year":"2021","unstructured":"Renjie Zhu, PingWei, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, and Zhenxing Qian. 2021. Fragile neural network watermarking with trigger image set. In Knowledge Science, Engineering and Management: 14th International Conference, KSEM 2021, Tokyo, Japan, August 14--16, 2021, Proceedings, Part I 14. Springer, 280--293."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3211736"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3755177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:58:29Z","timestamp":1765310309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3755177"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":48,"alternative-id":["10.1145\/3746027.3755177","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3755177","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}