|
[1]
|
Uchida, Y., Nagai, Y., Sakazawa, S. and Satoh, S. (2017) Embedding Watermarks into Deep Neural Networks. Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, Bucharest, 6-9 June 2017, 269-277. [Google Scholar] [CrossRef]
|
|
[2]
|
Guan, X., Feng, H., Zhang, W., Zhou, H., Zhang, J. and Yu, N. (2020) Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication. Proceedings of the 28th ACM International Conference on Multimedia, Seattle, 12-16 October 2020, 2273-2280. [Google Scholar] [CrossRef]
|
|
[3]
|
Adi, Y., Baum, C., Cisse, M., Pinkas, B. and Keshet, J. (2018) Turning Your Weakness into a Strength: Watermarking Deep Neural Networks by Backdooring. Proceedings of the 27th USENIX Conference on Security Symposium, Baltimore, 15-17 August 2018, 1615-1631.
|
|
[4]
|
Jia, H., Choquette-Choo, C., Chandrasekaran, V. and Papernot, N. (2021) Entangled Watermarks as a Defense against Model Extraction. Proceedings of the 2021 USENIX Conference on Security Symposium, Online, 11-13 August 2021, 1937-1954.
|
|
[5]
|
Xue, M., Wu, Z., Zhang, Y., Wang, J. and Liu, W. (2023) AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Transactions on Emerging Topics in Computing, 11, 664-678. [Google Scholar] [CrossRef]
|
|
[6]
|
Wu, Y., Xue, M., Gu, D., Zhang, Y. and Liu, W. (2022) Sample-Specific Backdoor Based Active Intellectual Property Protection for Deep Neural Networks. 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS), Incheon, 13-15 June 2022, 316-319. [Google Scholar] [CrossRef]
|
|
[7]
|
Kessler, G.C. and Hosmer, C. (2011) An Overview of Steganography. Advances in Computers, 83, 51-107. [Google Scholar] [CrossRef]
|
|
[8]
|
Cipolla, R., Gal, Y. and Kendall, A. (2018) Multi-Task Learning Using Uncertainty to Weigh Losses for Scene Geometry and Semantics. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, 18-23 June 2018, 7482-7491. [Google Scholar] [CrossRef]
|
|
[9]
|
Zhang, W., Li, L. and Barni, M. (2022) Covert Task Embedding: Turning a DNN into an Insider Agent Leaking Out Private Information. IEEE Transactions on Neural Networks and Learning Systems, 35, 10159-10166. [Google Scholar] [CrossRef]
|
|
[10]
|
Guo, Y., Qian, Z. and Zhang, X. (2022) Hiding Function with Neural Networks. 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), Shanghai, 26-28 September 2022, 1-5. [Google Scholar] [CrossRef]
|
|
[11]
|
Guo, C., Wu, R. and Weinberger, K. (2020) On Hiding Neural Networks Inside Neural Networks. arXiv: 2002.10078. [Google Scholar] [CrossRef]
|
|
[12]
|
Li, G., Li, S., Li, M., Zhang, X. and Qian, Z. (2023) Steganography of Steganographic Networks. Proceedings of the AAAI Conference on Artificial Intelligence, 37, 5178-5186. [Google Scholar] [CrossRef]
|
|
[13]
|
Li, G., Li, S., Li, M., Qian, Z. and Zhang, X. (2023) Towards Deep Network Steganography: From Networks to Networks. arXiv: 2307.03444. [Google Scholar] [CrossRef]
|
|
[14]
|
He, K., Zhang, X., Ren, S. and Sun, J. (2016) Deep Residual Learning for Image Recognition. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 27-30 June 2016, 770-778. [Google Scholar] [CrossRef]
|
|
[15]
|
Simonyan, K. and Zisserman, A. (2015) Very Deep Convolutional Networks for Large-Scale Image Recognition. Proceedings of the 2015 International Conference on Learning Representations, San Diego, 7-9 May 2015, 1-14.
|
|
[16]
|
Huang, G., Liu, Z., Van Der Maaten, L. and Weinberger, K.Q. (2017) Densely Connected Convolutional Networks. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, 21-26 July 2017, 2261-2269. [Google Scholar] [CrossRef]
|
|
[17]
|
Sandler, M., Howard, A., Zhu, M., Zhmoginov, A. and Chen, L. (2018) MobileNetV2: Inverted Residuals and Linear Bottlenecks. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, 18-23 June 2018, 4510-4520. [Google Scholar] [CrossRef]
|
|
[18]
|
Krizhevsky, A. (2009) Learning Multiple Layers of Features from Tiny Images. https://www.cs.toronto.edu/~kriz/learning-features-2009-TR.pdf
|
|
[19]
|
Xiao, H., Rasul, K. and Vollgraf, R. (2017) Fashion-MNIST: A Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv: 1708.07747. [Google Scholar] [CrossRef]
|
|
[20]
|
Huang, Z., Shao, W., Wang, X., Lin, L. and Luo, P. (2021) Rethinking the Pruning Criteria for Convolutional Neural Network. Proceedings of the 35th International Conference on Neural Information Processing Systems, Online, 6-14 December 2021, 16305-16318.
|
|
[21]
|
Tian, J., Zhou, J. and Duan, J. (2021) Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services. 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, 20-25 June 2021, 2205-2214. [Google Scholar] [CrossRef]
|