Trustworthy graph neural networks: Aspects, methods and trends

H Zhang, B Wu, X Yuan, S Pan, H Tong… - arXiv preprint arXiv …, 2022 - arxiv.org
Graph neural networks (GNNs) have emerged as a series of competent graph learning
methods for diverse real-world scenarios, ranging from daily applications like …

Model inversion attacks against collaborative inference

Z He, T Zhang, RB Lee - Proceedings of the 35th Annual Computer …, 2019 - dl.acm.org
The prevalence of deep learning has drawn attention to the privacy protection of sensitive
data. Various privacy threats have been presented, where an adversary can steal model …

A survey of neural trojan attacks and defenses in deep learning

J Wang, GM Hassan, N Akhtar - arXiv preprint arXiv:2202.07183, 2022 - arxiv.org
Artificial Intelligence (AI) relies heavily on deep learning-a technology that is becoming
increasingly popular in real-life applications of AI, even in the safety-critical and high-risk …

Fingerprinting deep neural networks globally via universal adversarial perturbations

Z Peng, S Li, G Chen, C Zhang… - Proceedings of the …, 2022 - openaccess.thecvf.com
In this paper, we propose a novel and practical mechanism which enables the service
provider to verify whether a suspect model is stolen from the victim model via model …

Robust watermarking for deep neural networks via bi-level optimization

P Yang, Y Lao, P Li - Proceedings of the IEEE/CVF …, 2021 - openaccess.thecvf.com
Deep neural networks (DNNs) have become state-of-the-art in many application domains.
The increasing complexity and cost for building these models demand means for protecting …

Attacking and protecting data privacy in edge–cloud collaborative inference systems

Z He, T Zhang, RB Lee - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Benefiting from the advance of deep learning (DL) technology, Internet-of-Things (IoT)
devices and systems are becoming more intelligent and multifunctional. They are expected …

Are you stealing my model? sample correlation for fingerprinting deep neural networks

J Guan, J Liang, R He - Advances in Neural Information …, 2022 - proceedings.neurips.cc
An off-the-shelf model as a commercial service could be stolen by model stealing attacks,
posing great threats to the rights of the model owner. Model fingerprinting aims to verify …

Actionbert: Leveraging user actions for semantic understanding of user interfaces

Z He, S Sunkara, X Zang, Y Xu, L Liu… - Proceedings of the …, 2021 - ojs.aaai.org
As mobile devices are becoming ubiquitous, regularly interacting with a variety of user
interfaces (UIs) is a common aspect of daily life for many people. To improve the …

A survey on neural trojans

Y Liu, A Mondal, A Chakraborty… - … on Quality Electronic …, 2020 - ieeexplore.ieee.org
Neural networks have become increasingly prevalent in many real-world applications
including security critical ones. Due to the high hardware requirement and time consumption …

Deep intellectual property protection: A survey

Y Sun, T Liu, P Hu, Q Liao, S Fu, N Yu, D Guo… - arXiv preprint arXiv …, 2023 - arxiv.org
Deep Neural Networks (DNNs), from AlexNet to ResNet to ChatGPT, have made
revolutionary progress in recent years, and are widely used in various fields. The high …