{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:23:09Z","timestamp":1755224589234,"version":"3.43.0"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"8","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172280 and U20B2051"],"award-info":[{"award-number":["62172280 and U20B2051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2023YFF0905000"],"award-info":[{"award-number":["2023YFF0905000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Shanghai","award":["21ZR1444600"],"award-info":[{"award-number":["21ZR1444600"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2025,8,31]]},"abstract":"<jats:p>With accelerating development of artificial intelligence, neural network models have been applied in many fields. The structure designing and training for models consume vast manpower and computing resources, which are the core interests of related research institutions and enterprises. However, the high-value attributes of neural network models also attract the attention of pirates, who may steal them for illegal profits and also slightly modify model parameters to escape model piracy detection. In order to solve the problem, in this work, we propose a robust and secure model hashing method based on dynamic branch reorganization and multi-feature fusion. Detailedly, we dynamically adjust the branches in our model hashing network to extract the robust features of all kinds of model parameters for generating the hash sequence. Besides, we integrate the encryption and the feature matrix generation to a unified stage in the hash generation for resisting possible encryption escape attack. Thus, the pirated models, even with some modifications, can be correctly detected through calculating hash distances. Experimental results demonstrate the effectiveness and superiority of our model hashing method with respect to pirated model detection, non-pirated model discrimination and security.<\/jats:p>","DOI":"10.1145\/3747297","type":"journal-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T10:00:22Z","timestamp":1751882422000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust and Secure Hashing Towards Pirated Neural Network Model Detection"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6201-2520","authenticated-orcid":false,"given":"Cheng","family":"Xiong","sequence":"first","affiliation":[{"name":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0370-4623","authenticated-orcid":false,"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1622-0561","authenticated-orcid":false,"given":"Zhenxing","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6181-6044","authenticated-orcid":false,"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0212-3501","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,8,12]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"1615","volume-title":"27th USENIX Security Symposium (USENIX Security\u00a0\u201918)","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi, Carsten Baum, Moustapha Ciss\u00e9, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th USENIX Security Symposium (USENIX Security\u00a0\u201918). USENIX Association, Baltimore, MD, 1615\u20131631."},{"key":"e_1_3_1_3_2","first-page":"14","volume-title":"ACM Asia Conference on Computer and Communications Security (ASIA CCS \u201921)","author":"Cao Xiaoyu","year":"2021","unstructured":"Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. 2021. IPGuard: Protecting intellectual property of deep neural networks via fingerprinting the classification boundary. In ACM Asia Conference on Computer and Communications Security (ASIA CCS \u201921). ACM, Hong Kong, 14\u201325."},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/3323873.3325042","volume-title":"Proceedings of the 2019 on International Conference on Multimedia Retrieval (ICMR \u201919)","author":"Chen Huili","year":"2019","unstructured":"Huili Chen, Bita Darvish Rouhani, Cheng Fu, Jishen Zhao, and Farinaz Koushanfar. 2019. DeepMarks: A secure fingerprinting framework for digital rights management of deep learning models. In Proceedings of the 2019 on International Conference on Multimedia Retrieval (ICMR \u201919). ACM, Ottawa, ON, Canada, 105\u2013113."},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3572777"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"11027","DOI":"10.1109\/CVPR42600.2020.01104","volume-title":"2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u00a0\u201920)","author":"Chen Yinpeng","year":"2020","unstructured":"Yinpeng Chen, Xiyang Dai, Mengchen Liu, Dongdong Chen, Lu Yuan, and Zicheng Liu. 2020. Dynamic convolution: Attention over convolution kernels. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR\u00a0\u201920). Computer Vision Foundation\/IEEE, Seattle, WA, 11027\u201311036."},{"key":"e_1_3_1_7_2","unstructured":"Junlong Cheng Jin Ye Zhongying Deng Jianpin Chen Tianbin Li Haoyu Wang Yanzhou Su Ziyan Huang Jilong Chen Lei Jiang et\u00a0al. 2023. SAM-Med2D. arXiv:2308.16184. Retrieved from https:\/\/arxiv.org\/abs\/2308.16184"},{"key":"e_1_3_1_8_2","first-page":"363","volume-title":"13th International Conference on Knowledge Science, Engineering and Management (KSEM \u201920)","author":"Feng Le","year":"2020","unstructured":"Le Feng and Xinpeng Zhang. 2020. Watermarking neural network with compensation mechanism. In 13th International Conference on Knowledge Science, Engineering and Management (KSEM \u201920). Springer, Hangzhou, China, 363\u2013375."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_1_10_2","first-page":"1314","volume-title":"2019 IEEE\/CVF International Conference on Computer Vision (ICCV \u201919)","author":"Howard Andrew","year":"2019","unstructured":"Andrew Howard, Ruoming Pang, Hartwig Adam, Quoc V. Le, Mark Sandler, Bo Chen, Weijun Wang, Liang-Chieh Chen, Mingxing Tan, Grace Chu, et\u00a0al. 2019. Searching for MobileNetV3. In 2019 IEEE\/CVF International Conference on Computer Vision (ICCV \u201919). IEEE, Seoul, Korea (South), 1314\u20131324."},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","first-page":"2261","DOI":"10.1109\/CVPR.2017.243","volume-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR \u201917)","author":"Huang Gao","year":"2017","unstructured":"Gao Huang, Zhuang Liu, Laurens van der Maaten, and Kilian Q. Weinberger. 2017. Densely connected convolutional networks. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR \u201917). IEEE Computer Society, Honolulu, HI, 2261\u20132269."},{"key":"e_1_3_1_12_2","unstructured":"Boah Kim Yujin Oh and Jong Chul Ye. 2022. Diffusion adversarial representation learning for self-supervised vessel segmentation. arXiv:2209.14566. Retrieved from https:\/\/arxiv.org\/abs\/2209.14566"},{"key":"e_1_3_1_13_2","unstructured":"Alex Krizhevsky. 2009. Learning Multiple Layers of Features from Tiny Images. Retrieved from https:\/\/api.semanticscholar.org\/CorpusID:18268744"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3259881"},{"key":"e_1_3_1_17_2","first-page":"402","volume-title":"19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom \u201920)","author":"Li Meng","year":"2020","unstructured":"Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang, and Yong Xiang. 2020. Protecting the intellectual property of deep neural networks with watermarking: The frequency domain approach. In 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom \u201920). IEEE, Guangzhou, China, 402\u2013409."},{"key":"e_1_3_1_18_2","first-page":"1","volume-title":"24th IEEE International Workshop on Multimedia Signal Processing (MMSP\u00a0\u201922)","author":"Li Xinran","year":"2022","unstructured":"Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, and Chuan Qin. 2022. Perceptual model hashing: Towards neural network model authentication. In 24th IEEE International Workshop on Multimedia Signal Processing (MMSP\u00a0\u201922). IEEE, Shanghai, China, 1\u20135."},{"key":"e_1_3_1_19_2","volume-title":"9th International Conference on Learning Representations (ICLR\u00a0\u201921)","author":"Lukas Nils","year":"2021","unstructured":"Nils Lukas, Yuxuan Zhang, and Florian Kerschbaum. 2021. Deep neural network fingerprinting by conferrable adversarial examples. In 9th International Conference on Learning Representations (ICLR\u00a0\u201921). OpenReview.net, Austria."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/S00521-019-04434-Z"},{"key":"e_1_3_1_21_2","volume-title":"The 10th International Conference on Learning Representations (ICLR \u201922)","author":"Miao Lu","year":"2022","unstructured":"Lu Miao, Xiaolong Luo, Tianlong Chen, Wuyang Chen, Dong Liu, and Zhangyang Wang. 2022. Learning pruning-friendly networks via Frank-Wolfe: One-shot, any-sparsity, and no retraining. In The 10th International Conference on Learning Representations (ICLR \u201922). OpenReview.net."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_1_23_2","first-page":"6517","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Redmon Joseph","year":"2017","unstructured":"Joseph Redmon and Ali Farhadi. 2017. YOLO9000: Better, faster, stronger. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 6517\u20136525."},{"key":"e_1_3_1_24_2","first-page":"4510","volume-title":"2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR\u00a0\u201918)","author":"Sandler Mark","year":"2018","unstructured":"Mark Sandler, Andrew G. Howard, Menglong Zhu, Andrey Zhmoginov, and Liang-Chieh Chen. 2018. MobileNetV2: Inverted residuals and linear bottlenecks. In 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR\u00a0\u201918). Computer Vision Foundation\/IEEE Computer Society, Salt Lake City, UT, 4510\u20134520."},{"key":"e_1_3_1_25_2","first-page":"24","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPR Workshops \u201919)","author":"Sathish Rachana","year":"2019","unstructured":"Rachana Sathish and Debdoot Sheet. 2019. Unit impulse response as an explainer of redundancy in a deep convolutional neural network. In IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPR Workshops \u201919). Computer Vision Foundation\/IEEE, Long Beach, CA, 24\u201327."},{"key":"e_1_3_1_26_2","volume-title":"3rd International Conference on Learning Representations (ICLR \u201915)","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. In 3rd International Conference on Learning Representations (ICLR \u201915)."},{"key":"e_1_3_1_27_2","first-page":"1","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR \u201915)","author":"Szegedy Christian","year":"2015","unstructured":"Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott E. Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going deeper with convolutions. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR \u201915). IEEE Computer Society, Boston, MA, 1\u20139."},{"key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1109\/CVPR.2016.308","volume-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR\u00a0\u201916)","author":"Szegedy Christian","year":"2016","unstructured":"Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jonathon Shlens, and Zbigniew Wojna. 2016. Rethinking the inception architecture for computer vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR\u00a0\u201916). IEEE Computer Society, Las Vegas, NV, 2818\u20132826."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_1_30_2","first-page":"1","volume-title":"IEEE International Symposium on Circuits and Systems (ISCAS \u201921)","author":"Wang Si","year":"2021","unstructured":"Si Wang and Chip-Hong Chang. 2021. Fingerprinting deep neural networks\u2014A DeepFool approach. In IEEE International Symposium on Circuits and Systems (ISCAS \u201921). IEEE, Daegu, South Korea, 1\u20135."},{"key":"e_1_3_1_31_2","first-page":"1042","volume-title":"24th IEEE International Conference on High Performance Computing and Communications","author":"Wu Hanzhou","year":"2022","unstructured":"Hanzhou Wu. 2022. Robust and lossless fingerprinting of deep neural networks via pooled membership inference. In 24th IEEE International Conference on High Performance Computing and Communications. IEEE, Hainan, China, 1042\u20131049."},{"key":"e_1_3_1_32_2","unstructured":"Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms. arXiv:1708.07747. Retrieved from https:\/\/arxiv.org\/abs\/1708.07747"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548247"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3064850"},{"key":"e_1_3_1_35_2","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/3196494.3196550","volume-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security (AsiaCCS \u201918)","author":"Zhang Jialong","year":"2018","unstructured":"Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph Stoecklin, Heqing Huang, and Ian M. Molloy. 2018. Protecting intellectual property of deep neural networks with watermarking. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (AsiaCCS \u201918). ACM, Incheon, Republic of Korea, 159\u2013172."},{"key":"e_1_3_1_36_2","first-page":"6848","volume-title":"2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR \u201918)","author":"Zhang Xiangyu","year":"2018","unstructured":"Xiangyu Zhang, Xinyu Zhou, Mengxiao Lin, and Jian Sun. 2018. ShuffleNet: An extremely efficient convolutional neural network for mobile devices. In 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR \u201918). Computer Vision Foundation\/IEEE Computer Society, Salt Lake City, UT, 6848\u20136856."},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMCOM.2019.12.016"},{"key":"e_1_3_1_38_2","first-page":"1","volume-title":"IEEE International Workshop on Information Forensics and Security (WIFS \u201921)","author":"Zhao Xiangyu","year":"2021","unstructured":"Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu, and Xinpeng Zhang. 2021. Structural watermarking to deep neural networks via network channel pruning. In IEEE International Workshop on Information Forensics and Security (WIFS \u201921). IEEE, Montpellier, France, 1\u20136."},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3198267"},{"key":"e_1_3_1_40_2","first-page":"3455","volume-title":"ACM Multimedia Conference (MM \u201921)","author":"Zhong Nan","year":"2021","unstructured":"Nan Zhong, Zhenxing Qian, and Xinpeng Zhang. 2021. Deep neural network retrieval. In ACM Multimedia Conference (MM \u201921). ACM, China, 3455\u20133463."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3747297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T20:37:09Z","timestamp":1755031029000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3747297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,12]]},"references-count":39,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8,31]]}},"alternative-id":["10.1145\/3747297"],"URL":"https:\/\/doi.org\/10.1145\/3747297","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2025,8,12]]},"assertion":[{"value":"2024-09-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}