Deep intellectual property protection: A survey

Y Sun, T Liu, P Hu, Q Liao, S Fu, N Yu, D Guo… - arXiv preprint arXiv …, 2023 - arxiv.org
Deep Neural Networks (DNNs), from AlexNet to ResNet to ChatGPT, have made
revolutionary progress in recent years, and are widely used in various fields. The high …

Continual learning and its industrial applications: A selective review

J Lian, K Choi, B Veeramani, A Hu… - … : Data Mining and …, 2024 - Wiley Online Library
In many industrial applications, datasets are often obtained in a sequence associated with a
series of similar but different tasks. To model these datasets, a machine‐learning algorithm …

Defending backdoor attacks on vision transformer via patch processing

KD Doan, Y Lao, P Yang, P Li - Proceedings of the AAAI Conference on …, 2023 - ojs.aaai.org
Abstract Vision Transformers (ViTs) have a radically different architecture with significantly
less inductive bias than Convolutional Neural Networks. Along with the improvement in …

Fedtracker: Furnishing ownership verification and traceability for federated learning model

S Shao, W Yang, H Gu, Z Qin, L Fan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Federated learning (FL) is a distributed machine learning paradigm allowing multiple clients
to collaboratively train a global model without sharing their local data. However, FL entails …

Free fine-tuning: A plug-and-play watermarking scheme for deep neural networks

R Wang, J Ren, B Li, T She, W Zhang, L Fang… - Proceedings of the 31st …, 2023 - dl.acm.org
Watermarking has been widely adopted for protecting the intellectual property (IP) of Deep
Neural Networks (DNN) to defend the unauthorized distribution. Unfortunately, studies have …

Wide flat minimum watermarking for robust ownership verification of gans

J Fei, Z Xia, B Tondi, M Barni - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
We propose a novel multi-bit box-free watermarking method for the protection of Intellectual
Property Rights (IPR) of GANs with improved robustness against white-box model-level …

Neural Lineage

R Yu, X Wang - Proceedings of the IEEE/CVF Conference …, 2024 - openaccess.thecvf.com
Given a well-behaved neural network is possible to identify its parent based on which it was
tuned? In this paper we introduce a novel task known as neural lineage detection aiming at …

Integrity authentication in tree models

W Zhao, Y Lao, P Li - Proceedings of the 28th ACM SIGKDD Conference …, 2022 - dl.acm.org
Tree models are very widely used in practice of machine learning and data mining. In this
paper, we study the problem of model integrity authentication in tree models. In general, the …

NL2GDPR: Automatically develop GDPR compliant Android application features from natural language

FH Shezan, Y Lao, M Peng, X Wang… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
The recent privacy leakage incidences and the more strict policy regulations demand a
much higher standard of compliance for companies and mobile apps. However, such …

Intellectual Property Protection for Deep Learning Model and Dataset Intelligence

Y Jiang, Y Gao, C Zhou, H Hu, A Fu… - arXiv preprint arXiv …, 2024 - arxiv.org
With the growing applications of Deep Learning (DL), especially recent spectacular
achievements of Large Language Models (LLMs) such as ChatGPT and LLaMA, the …