{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:01:01Z","timestamp":1760058061510,"version":"build-2065373602"},"reference-count":74,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:00:00Z","timestamp":1741651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>This paper introduces PK-Judge, a novel neural network watermarking framework designed to enhance the intellectual property (IP) protection by incorporating an asymmetric cryptograp hic approach in the verification process. Inspired by the paradigm shift from HTTP to HTTPS in enhancing web security, this work integrates public key infrastructure (PKI) principles to establish a secure and verifiable watermarking system. Unlike symmetric approaches, PK-Judge employs a public key infrastructure (PKI) to decouple ownership validation from the extraction process, significantly increasing its resilience against adversarial attacks. Additionally, it incorporates a robust challenge-response mechanism to mitigate replay attacks and leverages error correction codes (ECC) to achieve an Effective Bit Error Rate (EBER) of zero, ensuring watermark integrity even under conditions such as fine-tuning, pruning, and overwriting. Furthermore, PK-Judge introduces a new requirement based on the principle of separation of privilege, setting a foundation for secure and scalable watermarking mechanisms in machine learning. By addressing these critical challenges, PK-Judge advances the state-of-the-art in neural network IP protection and integrity, paving the way for trust-based AI technologies that prioritize security and verifiability.<\/jats:p>","DOI":"10.3390\/bdcc9030066","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T16:39:03Z","timestamp":1741711143000},"page":"66","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5512-4012","authenticated-orcid":false,"given":"Wafaa","family":"Kanakri","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Department, Purdue University, West Lafayette, IN 47907, USA"}]},{"given":"Brian","family":"King","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Purdue University, West Lafayette, IN 47907, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1177\/1357633X231167613","article-title":"Artificial intelligence assisted telehealth for nursing: A scoping review","volume":"31","author":"Choi","year":"2025","journal-title":"J. Telemed. Telecare"},{"key":"ref_2","unstructured":"(2024, October 01). OpenAI. ChatGPT: Optimizing Language Models for Dialogue. Available online: https:\/\/www.openai.com\/chatgpt."},{"key":"ref_3","unstructured":"Team, G., Anil, R., Borgeaud, S., Alayrac, J.B., Yu, J., Soricut, R., Schalkwyk, J., Dai, A.M., Hauth, A., and Millican, K. (2023). Gemini: A family of highly capable multimodal models. arXiv."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_5","unstructured":"Fan, L., and Wang, Y. (2019, January 8\u201314). Rethinking Deep Neural Network Ownership Verification: Embedding Passports To Defeat Ambiguity Attacks. Proceedings of the NeurIPS, Vancouver, BC, Canada."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., and Komodakis, N. (2016). Wide residual networks. arXiv.","DOI":"10.5244\/C.30.87"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/5.771066","article-title":"Multimedia watermarking techniques","volume":"87","author":"Hartung","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1852","DOI":"10.1109\/TNNLS.2020.2991378","article-title":"Watermarking deep neural networks in image processing","volume":"32","author":"Quan","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSP.2004.1276109","article-title":"Data hiding for fighting piracy","volume":"21","author":"Barni","year":"2004","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Uchida, Y., Nagai, Y., Sakazawa, S., and Satoh, S. (2017, January 6\u20139). Embedding Watermarks Into Deep Neural Networks. Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, Bucharest, Romania.","DOI":"10.1145\/3078971.3078974"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Darvish Rouhani, B., Chen, H., and Koushanfar, F. (2019, January 13\u201317). Deepsigns: An End-To-End Watermarking Framework For Ownership Protection Of Deep Neural Networks. Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, Providence, RI, USA.","DOI":"10.1145\/3297858.3304051"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Chen, H., Rouhani, B.D., Fu, C., Zhao, J., and Koushanfar, F. (2019, January 10\u201313). Deepmarks: A Secure Fingerprinting Framework For Digital Rights Management Of Deep Learning Models. Proceedings of the 2019 on International Conference on Multimedia Retrieval, Ottawa, ON, Canada.","DOI":"10.1145\/3323873.3325042"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Abuadbba, A., Kim, H., and Nepal, S. (2021, January 22\u201326). DeepiSign: Invisible Fragile Watermark To Protect The Integrity And Authenticity of CNN. Proceedings of the 36th Annual ACM Symposium on Applied Computing, Virtual.","DOI":"10.1145\/3412841.3441970"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Tang, R., Du, M., and Hu, X. (2023, January 18\u201322). Deep Serial Number: Computational Watermark for DNN Intellectual Property Protection. Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Turin, Italy.","DOI":"10.1007\/978-3-031-43427-3_10"},{"key":"ref_16","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and Berners-Lee, T. (2024, October 01). Hypertext Transfer Protocol\u2014HTTP\/1.1. RFC 2616. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc2616."},{"key":"ref_17","unstructured":"Rescorla, E. (2024, October 01). HTTP Over TLS. RFC 2818. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc2818."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wang, T., and Kerschbaum, F. (2019, January 12\u201317). Attacks on Digital Watermarks For Deep Neural Networks. Proceedings of the ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK.","DOI":"10.1109\/ICASSP.2019.8682202"},{"key":"ref_19","unstructured":"Namba, R., and Sakuma, J. (2019, January 15\u201320). Robust watermarking of neural network models against query modification attacks. Proceedings of the 2019 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA."},{"key":"ref_20","unstructured":"Liu, H., Weng, Z., and Zhu, Y. (2021, January 18\u201324). Watermarking Deep Neural Networks with Greedy Residuals. Proceedings of the ICML, Online."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wang, T., and Kerschbaum, F. (2021, January 19\u201323). RIGA: Covert and robust white-box watermarking of deep neural networks. Proceedings of the Web Conference, Ljubljana, Slovenia.","DOI":"10.1145\/3442381.3450000"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"6122","DOI":"10.1109\/TPAMI.2021.3088846","article-title":"Deepipr: Deep neural network ownership verification with passports","volume":"44","author":"Fan","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"103330","DOI":"10.1016\/j.sysarc.2025.103330","article-title":"LicenseNet: Proactively safeguarding intellectual property of AI models through model license","volume":"159","author":"Li","year":"2025","journal-title":"J. Syst. Archit."},{"key":"ref_24","unstructured":"Li, Y., Zhu, L., Jia, X., Bai, Y., Jiang, Y., Xia, S.T., and Cao, X. (2022). Move: Effective and harmless ownership verification via embedded external features. arXiv."},{"key":"ref_25","first-page":"1780","article-title":"You are caught stealing my winning lottery ticket! making a lottery ticket claim its ownership","volume":"34","author":"Chen","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Zhao, X., Yao, Y., Wu, H., and Zhang, X. (2021, January 7\u201310). Structural Watermarking To Deep Neural Networks Via Network Channel Pruning. Proceedings of the 2021 IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France.","DOI":"10.1109\/WIFS53200.2021.9648376"},{"key":"ref_27","unstructured":"Adi, Y., Baum, C., Cisse, M., Pinkas, B., and Keshet, J. (2018, January 15\u201317). Turning Your Weakness Into A Strength: Watermarking Deep Neural Networks by Backdooring. Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M.P., Huang, H., and Molloy, I. (2018, January 4\u20138). Protecting Intellectual Property Of Deep Neural Networks with Watermarking. Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea.","DOI":"10.1145\/3196494.3196550"},{"key":"ref_29","unstructured":"Jia, H., Choquette-Choo, C.A., Chandrasekaran, V., and Papernot, N. (2021, January 11\u201313). Entangled Watermarks As A Defense Against Model Extraction. Proceedings of the 30th USENIX security symposium (USENIX Security 21), Vancouver, BC, Canada."},{"key":"ref_30","unstructured":"Jia, J., Wu, Y., Li, A., Ma, S., and Liu, Y. (2022). Subnetwork-lossless robust watermarking for hostile theft attacks in deep transfer learning models. IEEE Trans. Dependable Secur. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"106199","DOI":"10.1016\/j.neunet.2024.106199","article-title":"SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning","volume":"174","author":"Li","year":"2024","journal-title":"Neural Netw."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Peng, S., Chen, Y., Wang, C., and Jia, X. (2025, January 2\u20135). Intellectual Property Protection of Diffusion Models Via the Watermark Diffusion Process. Proceedings of the International Conference on Web Information Systems Engineering, Doha, Qatar.","DOI":"10.1007\/978-981-96-0567-5_21"},{"key":"ref_33","unstructured":"Xu, H., Xiang, L., Ma, X., Yang, B., and Li, B. (2024). Hufu: A Modality-Agnositc Watermarking System for Pre-Trained Transformers via Permutation Equivariance. arXiv."},{"key":"ref_34","unstructured":"Kim, B., Lee, S., Lee, S., Son, S., and Hwang, S.J. (2023, January 23\u201329). Margin-Based Neural Network Watermarking. Proceedings of the International Conference on Machine Learning. PMLR, Honolulu, HI, USA."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Mehta, D., Mondol, N., Farahmandi, F., and Tehranipoor, M. (2022, January 14\u201323). Aime: Watermarking ai Models by Leveraging Errors. Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), Antwerp, Belgium.","DOI":"10.23919\/DATE54114.2022.9774656"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Yang, P., Lao, Y., and Li, P. (2021, January 11\u201317). Robust Watermarking For Deep Neural Networks Via Bi-Level Optimization. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Montreal, QC, Canada.","DOI":"10.1109\/ICCV48922.2021.01457"},{"key":"ref_37","unstructured":"Bansal, A., Chiang, P.y., Curry, M.J., Jain, R., Wigington, C., Manjunatha, V., Dickerson, J.P., and Goldstein, T. (2022, January 17\u201323). Certified Neural Network Watermarks With Randomized Smoothing. Proceedings of the International Conference on Machine Learning. PMLR, Baltimore, MA, USA."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"3362","DOI":"10.1109\/TAI.2024.3351116","article-title":"Deep Model Intellectual Property Protection with Compression-Resistant Model Watermarking","volume":"5","author":"Nie","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Szyller, S., Atli, B.G., Marchal, S., and Asokan, N. (2021, January 20\u201324). Dawn: Dynamic Adversarial Watermarking of Neural Networks. Proceedings of the 29th ACM International Conference on Multimedia, Chengdu, China.","DOI":"10.1145\/3474085.3475591"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"5214","DOI":"10.1109\/TDSC.2023.3242737","article-title":"A robustness-assured white-box watermark in neural networks","volume":"20","author":"Lv","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_41","unstructured":"Wang, R., Ren, J., Li, B., She, T., Zhang, W., Fang, L., Chen, J., and Wang, L. (November, January 29). Free Fine-Tuning: A Plug-And-Play Watermarking Scheme for Deep Neural Networks. Proceedings of the 31st ACM International Conference on Multimedia, Ottawa, ON, Canada."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Pautov, M., Bogdanov, N., Pyatkin, S., Rogov, O., and Oseledets, I. (2024). Probabilistically Robust Watermarking of Neural Networks. arXiv.","DOI":"10.24963\/ijcai.2024\/528"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Wang, S., and Chang, C.H. (2021, January 22\u201328). Fingerprinting deep neural networks\u2014A deepfool approach. Proceedings of the 2021 IEEE International Symposium on Circuits and Systems (ISCAS), Virtual.","DOI":"10.1109\/ISCAS51556.2021.9401119"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Cao, X., Jia, J., and Gong, N.Z. (2021, January 7\u201311). IPGuard: Protecting Intellectual Property Of Deep Neural Networks Via Fingerprinting The Classification Boundary. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Virtual Event.","DOI":"10.1145\/3433210.3437526"},{"key":"ref_45","unstructured":"Lukas, N., Zhang, Y., and Kerschbaum, F. (2019). Deep neural network fingerprinting by conferrable adversarial examples. arXiv."},{"key":"ref_46","unstructured":"\u0130\u015fler, D., Hwang, S., Nakatsuka, Y., Laoutaris, N., and Tsudik, G. (2023). Puppy: A Publicly Verifiable Watermarking Protocol. arXiv."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","article-title":"The protection of information in computer systems","volume":"63","author":"Saltzer","year":"1975","journal-title":"Proc. IEEE"},{"key":"ref_48","unstructured":"Stallings, W., and Brown, L. (2015). Computer Security Principles and Practice, Pearson."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"ElGamal","year":"1985","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., and Shacham, H. (2001, January 9\u201313). Short Signatures from the Weil Pairing. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia.","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","article-title":"Polynomial codes over certain finite fields","volume":"8","author":"Reed","year":"1960","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","article-title":"Error detecting and error correcting codes","volume":"29","author":"Hamming","year":"1950","journal-title":"Bell Syst. Tech. J."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/S0019-9958(60)90287-4","article-title":"On a class of error correcting binary group codes","volume":"3","author":"Bose","year":"1960","journal-title":"Inf. Control."},{"key":"ref_55","unstructured":"Berrou, C., Glavieux, A., and Thitimajshima, P. (1993, January 23\u201326). Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1. Proceedings of the ICC\u201993-IEEE International Conference on Communications, Geneva, Switzerland."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","article-title":"Low-density parity-check codes","volume":"8","author":"Gallager","year":"1962","journal-title":"IRE Trans. Inf. Theory"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Bottou, L. (2010, January 22\u201327). Large-Scale Machine Learning with Stochastic Gradient Descent. Proceedings of the COMPSTAT\u20192010: 19th International Conference on Computational Statistics, Paris, France. Keynote, Invited and Contributed Papers.","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"ref_59","unstructured":"Giry, D. (2024, October 01). Keylength\u2014Cryptographic Key Length Recommendation. Online, 2020. Version 32.3, Last Updated: May 24, 2020. Available online: https:\/\/www.keylength.com\/."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Katz, J., and Lindell, Y. (2007). Introduction to Modern Cryptography: Principles and Protocols, Chapman and Hall\/CRC.","DOI":"10.1201\/9781420010756"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Chen, Y., Tian, J., Chen, X., and Zhou, J. (2023, January 18\u201322). Effective Ambiguity Attack Against Passport-Based Dnn Intellectual Property Protection Schemes Through Fully Connected Layer Substitution. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, BC, Canada.","DOI":"10.1109\/CVPR52729.2023.00785"},{"key":"ref_62","unstructured":"International Telecommunication Union (2024, October 05). The ITU-T Recommendation X.509: Information Technology\u2014Open Systems Interconnection\u2014The Directory: Public-Key and Attribute Certificate Frameworks. Available online: https:\/\/www.itu.int\/rec\/T-REC-X.509\/en."},{"key":"ref_63","first-page":"1","article-title":"Diginotar certificate authority breach \u201coperation black tulip\u201d","volume":"18","author":"Prins","year":"2011","journal-title":"Fox-IT"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New Directions in Cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_65","unstructured":"Cooper, M.J., and Schaffer, K.B. (2024, October 30). Security Requirements for Cryptographic Modules, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.140-3.pdf."},{"key":"ref_66","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"Paszke","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep Residual Learning For Image Recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_68","unstructured":"Krizhevsky, A., and Hinton, G. (2024, October 07). Learning Multiple Layers of Features from Tiny Images. Available online: http:\/\/www.cs.utoronto.ca\/~kriz\/learning-features-2009-TR.pdf."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., and Weinberger, K.Q. (2017, January 21\u201326). Densely Connected Convolutional Networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_70","unstructured":"Chia Network (2024, November 15). BLS Signatures. Available online: https:\/\/github.com\/Chia-Network\/bls-signatures."},{"key":"ref_71","unstructured":"Davis, J. (2024, October 30). Reed Solomon Encoder\/Decoder. Available online: https:\/\/pypi.org\/project\/reedsolo\/."},{"key":"ref_72","first-page":"1135","article-title":"Learning both weights and connections for efficient neural network","volume":"28","author":"Han","year":"2015","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Howard, J., and Ruder, S. (2018). Universal language model fine-tuning for text classification. arXiv.","DOI":"10.18653\/v1\/P18-1031"},{"key":"ref_74","unstructured":"Chen, H., Rouhani, B.D., and Koushanfar, F. (2019). Blackmarks: Blackbox multibit watermarking for deep neural networks. arXiv."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/3\/66\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:50:51Z","timestamp":1760028651000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/3\/66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,11]]},"references-count":74,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["bdcc9030066"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9030066","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2025,3,11]]}}}