{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:56Z","timestamp":1776926336922,"version":"3.51.2"},"reference-count":37,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064620","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:33Z","timestamp":1750309293000},"page":"4887-4906","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Active Protection Scheme of DNN Intellectual Property Rights Based on Feature Layer Selection and Hyperchaotic Mapping"],"prefix":"10.32604","volume":"84","author":[{"given":"Xintao","family":"Duan","sequence":"first","affiliation":[]},{"given":"Yinhang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"44977","DOI":"10.1007\/s11042-023-15295-z","article-title":"Recent advances in deep learning models: a systematic literature review","volume":"82","author":"Malhotra","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1877","DOI":"10.1007\/s11280-022-01113-3","article-title":"Intellectual property protection of DNN models","volume":"26","author":"Peng","year":"2023","journal-title":"World Wide Web"},{"key":"ref3","series-title":"Proceedings of the 35th Annual Computer Security Applications Conference; 2019 Dec 9\u201313; San Juan, Puerto Rico","first-page":"126","article-title":"How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN","author":"Li"},{"key":"ref4","series-title":"2023 IEEE 12th Global Conference on Consumer Electronics (GCCE)","first-page":"792","article-title":"Generation management of white-box DNN model watermarking","author":"Furukawa","year":"2023 Oct 10\u201313"},{"key":"ref5","series-title":"ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"3059","article-title":"Speech pattern based black-box model watermarking for automatic speech recognition","author":"Chen","year":"2022 May 22\u201327"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.neucom.2021.07.051","article-title":"A survey of deep neural network watermarking techniques","volume":"461","author":"Li","year":"2021","journal-title":"Neurocomputing"},{"key":"ref7","first-page":"1","author":"Ogundokun","year":"2024","journal-title":"Multimedia watermarking"},{"key":"ref8","first-page":"4005","article-title":"Deep model intellectual property protection via deep watermarking","volume":"44","author":"Zhang","year":"2021","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"7421","DOI":"10.1007\/s00521-024-09469-5","article-title":"Deep neural networks watermark via universal deep hiding and metric learning","volume":"36","author":"Ye","year":"2024","journal-title":"Neural Comput Appl"},{"key":"ref10","series-title":"Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval; 2017 Jun 6\u20139; Bucharest, Romania","first-page":"269","article-title":"Embedding watermarks into deep neural networks","author":"Uchida"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"Chen H, Rohani BD, Koushanfar F. Deepmarks: a digital fingerprinting framework for deep neural networks. arXiv:1804.03648. 2018.","DOI":"10.1145\/3323873.3325042"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2020.4.MWSF-022","article-title":"Watermarking in deep neural networks via error back-propagation","volume":"32","author":"Wang","year":"2020","journal-title":"Electron Imaging"},{"key":"ref13","series-title":"27th USENIX Security Symposium (USENIX Security 18); 2018 Aug 15\u201317; Baltimore, MD, USA","first-page":"1615","article-title":"Turning your weakness into a strength: watermarking deep neural networks by backdooring","author":"Adi"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"9233","DOI":"10.1007\/s00521-019-04434-z","article-title":"Adversarial frontier stitching for remote neural network watermarking","volume":"32","author":"Le Merrer","year":"2020","journal-title":"Neural Comput Appl"},{"key":"ref15","series-title":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"402","article-title":"Protecting the intellectual property of deep neural networks with watermarking: the frequency domain approach","author":"Li","year":"2020 Dec 29\u20132021 Jan 1"},{"key":"ref16","series-title":"2020 IEEE 9th Global Conference on Consumer Electronics (GCCE)","first-page":"818","article-title":"Training DNN model with secret key for model protection","author":"Pyone","year":"2020 Oct 13\u201316"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TDSC.2022.3222972","article-title":"Protecting intellectual property with reliable availability of learning models in AI-based cybersecurity services","volume":"21","author":"Ren","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1560","DOI":"10.1109\/LSP.2021.3100307","article-title":"Hierarchical authorization of convolutional neural networks for multi-user","volume":"28","author":"Luo","year":"2021","journal-title":"IEEE Signal Process Lett"},{"key":"ref19","first-page":"343","article-title":"Hierarchical services of convolutional neural networks via probabilistic selective encryption","volume":"16","author":"Tian","year":"2021","journal-title":"IEEE Trans Serv Comput"},{"key":"ref20","unstructured":"Pan Q, Dong M, Ota K, Wu J. Device-bind key-storageless hardware AI model IP protection: a PUF and permute-diffusion encryption-enabled approach. arXiv:2212.11133. 2022."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"6122","DOI":"10.1109\/TPAMI.2021.3088846","article-title":"DeepIPR: deep neural network ownership verification with passports","volume":"44","author":"Fan","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref22","series-title":"2020 57th ACM\/IEEE Design Automation Conference (DAC)","first-page":"1","article-title":"Hardware-assisted intellectual property protection of deep learning models","author":"Chakraborty","year":"2020 Jul 20\u201324"},{"key":"ref23","series-title":"ICML\u201923: International Conference on Machine Learning","first-page":"42614","article-title":"NNSplitter: an active defense solution for DNN model via automated weight obfuscation","author":"Zhou","year":"2023 Jul 23\u201329"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s11071-017-3436-y","article-title":"An image encryption algorithm based on compound homogeneous hyper-chaotic system","volume":"89","author":"Zhu","year":"2017","journal-title":"Nonlinear Dyn"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1007\/s11071-018-4426-4","article-title":"A novel plaintext-related image encryption scheme using hyper-chaotic system","volume":"94","author":"Li","year":"2018","journal-title":"Nonlinear Dyn"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1109\/TCAD.2020.3018403","article-title":"Chaotic weights: a novel approach to protect intellectual property of deep neural networks","volume":"40","author":"Lin","year":"2020","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"key":"ref27","first-page":"3146","article-title":"Protecting the intellectual property of binary deep neural networks with efficient spintronic-based hardware obfuscation","volume":"71","author":"Mohseni","year":"2024","journal-title":"IEEE Trans Circuits Syst I: Regul Pap"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3679202","article-title":"SSAT: active authorization control and user\u2019s fingerprint tracking framework for DNN IP protection","volume":"20","author":"Xue","year":"2024","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"106199","DOI":"10.1016\/j.neunet.2024.106199","article-title":"Proactive intellectual property protection and model security defense for DNNs based on backdoor learning","volume":"174","author":"Li","year":"2024","journal-title":"Neural Netw"},{"key":"ref30","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"Technical Report"},{"key":"ref31","unstructured":"Xiao H, Rasul K, Vollgraf R. Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv:1708.07747. 2017."},{"key":"ref32","series-title":"2009 IEEE Conference on Computer Vision and Pattern Recognition","first-page":"248","article-title":"ImageNet: a large-scale hierarchical image database","author":"Deng","year":"2009 Jun 20\u201325"},{"key":"ref33","series-title":"International Conference on Machine Learning","first-page":"6105","article-title":"EfficientNet: rethinking model scaling for convolutional neural networks","author":"Tan","year":"2019 Jun 9\u201315"},{"key":"ref34","series-title":"Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2018 Jun 18\u201323; Salt Lake City, UT, USA","article-title":"MobileNetV2: inverted residuals and linear bottlenecks","author":"Sandler"},{"key":"ref35","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition; 2016 Jun 27\u201330; Las Vegas, NV, USA","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He"},{"key":"ref36","series-title":"Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition; 2018 Jun 18\u201323; Salt Lake City, UT, USA","first-page":"6848","article-title":"ShuffleNet: an extremely efficient convolutional neural network for mobile devices","author":"Zhang"},{"key":"ref37","unstructured":"Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556. 2014."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_64620\/TSP_CMC_64620.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:25Z","timestamp":1776923125000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":37,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064620","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}