{"id":"https://openalex.org/W4408351858","doi":"https://doi.org/10.1109/icassp49660.2025.10890687","title":"Membership Encoding for Black-Box Neural Network Watermarking","display_name":"Membership Encoding for Black-Box Neural Network Watermarking","publication_year":2025,"publication_date":"2025-03-12","ids":{"openalex":"https://openalex.org/W4408351858","doi":"https://doi.org/10.1109/icassp49660.2025.10890687"},"language":"en","primary_location":{"id":"doi:10.1109/icassp49660.2025.10890687","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp49660.2025.10890687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5118278153","display_name":"Hangwei Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hangwei Zhang","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023015254","display_name":"Fangqi Li","orcid":"https://orcid.org/0000-0001-7965-5170"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fang-Qi Li","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101717685","display_name":"Shilin Wang","orcid":"https://orcid.org/0000-0002-8214-6809"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shi-Lin Wang","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Electronic Information and Electrical Engineering","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5118278153"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04071501,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8252311944961548},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.7929478883743286},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.7499841451644897},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.701737642288208},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6201003193855286},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37414199113845825},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.16803887486457825}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8252311944961548},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.7929478883743286},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.7499841451644897},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.701737642288208},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6201003193855286},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37414199113845825},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.16803887486457825}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp49660.2025.10890687","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp49660.2025.10890687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2155904486","https://openalex.org/W2194775991","https://openalex.org/W2535690855","https://openalex.org/W2579318729","https://openalex.org/W2768064608","https://openalex.org/W2806082141","https://openalex.org/W2807363941","https://openalex.org/W2964128659","https://openalex.org/W2985954225","https://openalex.org/W2990980946","https://openalex.org/W3022293880","https://openalex.org/W3091877649","https://openalex.org/W3156793535","https://openalex.org/W3158240034","https://openalex.org/W3164111940","https://openalex.org/W3168768313","https://openalex.org/W4288057808","https://openalex.org/W4304091557","https://openalex.org/W4387967949","https://openalex.org/W4390481384","https://openalex.org/W6640425456","https://openalex.org/W6743581629","https://openalex.org/W6747838042","https://openalex.org/W6757248479","https://openalex.org/W6774150056","https://openalex.org/W6781511523","https://openalex.org/W6787972765","https://openalex.org/W6790544463","https://openalex.org/W6795583848","https://openalex.org/W6797414954"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1846726187","https://openalex.org/W1593964766","https://openalex.org/W2387614453","https://openalex.org/W2365808414"],"abstract_inverted_index":{"Deep":[0],"neural":[1],"network":[2],"watermarking":[3,17,59],"is":[4],"an":[5],"emerging":[6],"technique":[7],"for":[8],"protecting":[9],"the":[10,20,68,102,105],"copyright":[11],"of":[12,74],"models.":[13],"Most":[14],"existing":[15],"black-box":[16,58],"methods":[18],"leverage":[19],"backdoor,":[21],"making":[22,82],"them":[23],"inherently":[24],"vulnerable":[25],"to":[26,85,101],"backdoor":[27,86],"removal":[28,38,87],"attacks.":[29,88],"In":[30],"this":[31,52],"paper,":[32],"we":[33,54],"propose":[34],"a":[35,56,72],"novel":[36,57],"watermark":[37],"attack,":[39],"Misleading":[40],"Fine-tuning,":[41],"which":[42],"effectively":[43],"eliminates":[44],"backdoor-based":[45],"watermarks":[46],"with":[47],"limited":[48],"data.":[49],"To":[50],"counter":[51],"threat,":[53],"present":[55],"method":[60,66],"based":[61],"on":[62,71],"membership":[63],"encoding.":[64],"This":[65],"overfits":[67],"protected":[69],"model":[70,103],"subset":[73],"training":[75],"data":[76],"that":[77],"serve":[78],"as":[79],"triggers,":[80],"thereby":[81],"it":[83],"resistant":[84],"Extensive":[89],"experiments":[90],"demonstrate":[91],"its":[92],"fidelity":[93],"and":[94],"robustness":[95],"against":[96],"adversarial":[97],"modifications,":[98],"whether":[99],"applied":[100],"or":[104],"inputs.":[106]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
