Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection
Abstract
References
Index Terms
- Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection
Recommendations
Did You Train on My Dataset? Towards Public Dataset Protection with CleanLabel Backdoor Watermarking
The huge supporting training data on the Internet has been a key factor in the success of deep learning models. However, this abundance of public-available data also raises concerns about the unauthorized exploitation of datasets for commercial purposes, ...
Active intellectual property protection for deep neural networks through stealthy backdoor and users’ identities authentication
AbstractRecently, the intellectual properties (IP) protection of deep neural networks (DNN) has attracted serious concerns. A number of DNN copyright protection methods have been proposed. However, most of the existing DNN watermarking methods can only ...
DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper)
GLSVLSI '21: Proceedings of the 2021 Great Lakes Symposium on VLSISince the training of deep neural networks (DNN) models requires massive training data, time and expensive hardware resources, the trained DNN model is oftentimes regarded as an intellectual property (IP). Recent researches show that DNN is vulnerable to ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 51Total Downloads
- Downloads (Last 12 months)51
- Downloads (Last 6 weeks)5
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format