{"id":"https://openalex.org/W4298575286","doi":"https://doi.org/10.1109/icc45855.2022.9839218","title":"Privacy-Preserving DNN Model Authorization against Model Theft and Feature Leakage","display_name":"Privacy-Preserving DNN Model Authorization against Model Theft and Feature Leakage","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4298575286","doi":"https://doi.org/10.1109/icc45855.2022.9839218"},"language":"en","primary_location":{"id":"doi:10.1109/icc45855.2022.9839218","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839218","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025635683","display_name":"Qiushi Li","orcid":"https://orcid.org/0000-0003-1449-0568"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiushi Li","raw_affiliation_strings":["Tsinghua University,BNRist,Department of Computer Science and Technology","Department of Computer Science and Technology, BNRist, Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,BNRist,Department of Computer Science and Technology","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Computer Science and Technology, BNRist, Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015419107","display_name":"Ju Ren","orcid":"https://orcid.org/0000-0003-2782-183X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ju Ren","raw_affiliation_strings":["Tsinghua University,BNRist,Department of Computer Science and Technology","Department of Computer Science and Technology, BNRist, Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,BNRist,Department of Computer Science and Technology","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Computer Science and Technology, BNRist, Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052528809","display_name":"Yuezhi Zhou","orcid":"https://orcid.org/0000-0002-1850-3007"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuezhi Zhou","raw_affiliation_strings":["Tsinghua University,BNRist,Department of Computer Science and Technology","Department of Computer Science and Technology, BNRist, Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,BNRist,Department of Computer Science and Technology","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Computer Science and Technology, BNRist, Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069049205","display_name":"Yaoxue Zhang","orcid":"https://orcid.org/0000-0001-6717-461X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaoxue Zhang","raw_affiliation_strings":["Tsinghua University,BNRist,Department of Computer Science and Technology","Department of Computer Science and Technology, BNRist, Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,BNRist,Department of Computer Science and Technology","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Computer Science and Technology, BNRist, Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025635683"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.3109,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.50864694,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"5633","last_page":"5638"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.6408621668815613},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.633100152015686},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5736933350563049},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5440506339073181},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4227708578109741},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41655397415161133}],"concepts":[{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.6408621668815613},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.633100152015686},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5736933350563049},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5440506339073181},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4227708578109741},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41655397415161133},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45855.2022.9839218","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839218","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322392","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2027595342","https://openalex.org/W2119231103","https://openalex.org/W2473418344","https://openalex.org/W2767079719","https://openalex.org/W2773194476","https://openalex.org/W2777914285","https://openalex.org/W2804381866","https://openalex.org/W2949073274","https://openalex.org/W2951368041","https://openalex.org/W2956355137","https://openalex.org/W2962877476","https://openalex.org/W2967497108","https://openalex.org/W3021878953","https://openalex.org/W3092701607","https://openalex.org/W3217809002","https://openalex.org/W4298221930"],"related_works":["https://openalex.org/W4235015634","https://openalex.org/W2117923609","https://openalex.org/W4234860444","https://openalex.org/W4253622004","https://openalex.org/W1525729407","https://openalex.org/W50210207","https://openalex.org/W2724882332","https://openalex.org/W318910614","https://openalex.org/W4400987421","https://openalex.org/W4400590741"],"abstract_inverted_index":{"Today\u2019s":[0],"intelligent":[1],"services":[2],"are":[3],"built":[4],"on":[5,134],"well-trained":[6],"deep":[7],"neural":[8],"network":[9],"(DNN)":[10],"models,":[11],"which":[12,145],"usually":[13],"require":[14],"large":[15],"private":[16,62],"datasets":[17],"along":[18],"with":[19],"a":[20,102,116,202],"high":[21],"cost":[22],"for":[23,52,123,142,195],"model":[24,30,88,104,131,159,227],"training.":[25],"It":[26],"consequently":[27],"makes":[28],"the":[29,33,110,157,188],"providers":[31],"cherish":[32],"pre-trained":[34],"DNN":[35,143],"models":[36,51,67],"and":[37,56,204,214,229],"only":[38],"distribute":[39],"them":[40],"to":[41,68,83,108,126,161,191,208,224],"authorized":[42,66,174],"users.":[43],"However,":[44],"malicious":[45],"users":[46],"can":[47,59],"steal":[48],"these":[49],"valuable":[50],"abuse,":[53],"illegal":[54],"copy":[55],"redistribution.":[57],"Attackers":[58],"also":[60],"extract":[61],"features":[63,129],"from":[64,79],"even":[65],"leak":[69],"partial":[70],"training":[71],"datasets.":[72],"They":[73],"both":[74],"violate":[75],"privacy.":[76],"Existing":[77],"techniques":[78],"secure":[80],"community":[81],"attempt":[82],"avoid":[84],"parameter":[85],"leakage":[86],"during":[87],"authorization":[89,105],"but":[90],"yet":[91],"cannot":[92],"solve":[93],"privacy":[94,112],"issues":[95],"sufficiently.":[96],"In":[97,198],"this":[98,177],"paper,":[99],"we":[100,136,200],"propose":[101,138],"privacy-preserving":[103,223],"approach,":[106],"AgAuth,":[107],"resist":[109],"aforementioned":[111],"threats.":[113],"We":[114],"devise":[115],"novel":[117],"scheme":[118],"called":[119],"Information-Agnostic":[120],"Conversion":[121],"(IAC)":[122],"forwarding":[124,169],"procedure":[125],"eliminate":[127],"residual":[128],"in":[130,149],"parameters.":[132],"Based":[133],"it,":[135],"then":[137],"Inference-on-Ciphertext":[139],"(CiFer)":[140],"mechanism":[141],"reasoning,":[144],"includes":[146],"three":[147],"stages":[148],"each":[150],"forwarding.":[151],"The":[152,165,183,212],"Encrypt":[153],"phase":[154,185],"first":[155],"converts":[156],"proprietary":[158],"parameters":[160],"demonstrate":[162,217],"uniform":[163],"distribution.":[164],"Forward":[166],"stage":[167,178],"per-forms":[168],"function":[170],"without":[171,232],"decryption":[172],"at":[173],"side.":[175],"Specifically,":[176],"just":[179],"computes":[180],"over":[181],"ciphertext.":[182],"Decrypt":[184],"finally":[186],"recovers":[187],"information-agnostic":[189],"outputs":[190],"informative":[192],"output":[193],"tensor":[194],"real-world":[196],"services.":[197],"addition,":[199],"implement":[201],"prototype":[203],"conduct":[205],"extensive":[206],"experiments":[207],"evaluate":[209],"its":[210],"performance.":[211],"qualitative":[213],"quantitative":[215],"results":[216],"that":[218],"our":[219],"solution":[220],"AgAuth":[221],"is":[222],"defend":[225],"against":[226],"theft":[228],"feature":[230],"leakage,":[231],"accuracy":[233],"loss":[234],"or":[235],"notable":[236],"performance":[237],"decrease.":[238]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
