{"id":"https://openalex.org/W4415708236","doi":"https://doi.org/10.1109/icme59968.2025.11209097","title":"Texture-Aware Neural Radiance Fields Watermarking for Resisting Feature-Modulation Surrogate Model Attacks","display_name":"Texture-Aware Neural Radiance Fields Watermarking for Resisting Feature-Modulation Surrogate Model Attacks","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4415708236","doi":"https://doi.org/10.1109/icme59968.2025.11209097"},"language":null,"primary_location":{"id":"doi:10.1109/icme59968.2025.11209097","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme59968.2025.11209097","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066353335","display_name":"Lei Tan","orcid":"https://orcid.org/0000-0003-2752-5694"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Tan","raw_affiliation_strings":["Fudan University,School of Computer Science"],"affiliations":[{"raw_affiliation_string":"Fudan University,School of Computer Science","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058514897","display_name":"Yuliang Xue","orcid":"https://orcid.org/0000-0002-4628-2504"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuliang Xue","raw_affiliation_strings":["Fudan University,School of Computer Science"],"affiliations":[{"raw_affiliation_string":"Fudan University,School of Computer Science","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072158106","display_name":"Guobiao Li","orcid":"https://orcid.org/0000-0002-5531-7043"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guobiao Li","raw_affiliation_strings":["Fudan University,School of Computer Science"],"affiliations":[{"raw_affiliation_string":"Fudan University,School of Computer Science","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036715206","display_name":"Zhenxing Qian","orcid":"https://orcid.org/0000-0002-5224-6374"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenxing Qian","raw_affiliation_strings":["Fudan University,School of Computer Science"],"affiliations":[{"raw_affiliation_string":"Fudan University,School of Computer Science","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100359821","display_name":"Sheng Li","orcid":"https://orcid.org/0000-0002-7932-9831"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Li","raw_affiliation_strings":["Fudan University,School of Computer Science"],"affiliations":[{"raw_affiliation_string":"Fudan University,School of Computer Science","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071724015","display_name":"Xinpeng Zhang","orcid":"https://orcid.org/0000-0001-5867-1315"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinpeng Zhang","raw_affiliation_strings":["Fudan University,School of Computer Science"],"affiliations":[{"raw_affiliation_string":"Fudan University,School of Computer Science","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5066353335"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17521805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9546999931335449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9546999931335449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.014700000174343586,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.007499999832361937,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9297000169754028},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8008000254631042},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.46619999408721924},{"id":"https://openalex.org/keywords/radiance","display_name":"Radiance","score":0.3824999928474426},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.37380000948905945},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.3528999984264374},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.33980000019073486}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9297000169754028},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8008000254631042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6660000085830688},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5760999917984009},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5113999843597412},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.46619999408721924},{"id":"https://openalex.org/C23690007","wikidata":"https://www.wikidata.org/wiki/Q1411145","display_name":"Radiance","level":2,"score":0.3824999928474426},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.37380000948905945},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3528999984264374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3398999869823456},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.33980000019073486},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3391000032424927},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.3325999975204468},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.32710000872612},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.2685999870300293},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.2572999894618988}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icme59968.2025.11209097","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme59968.2025.11209097","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1986849647","https://openalex.org/W2133665775","https://openalex.org/W2883233582","https://openalex.org/W2962785568","https://openalex.org/W3034856584","https://openalex.org/W3133747496","https://openalex.org/W4200150166","https://openalex.org/W4311099598","https://openalex.org/W4386065887","https://openalex.org/W4386158764","https://openalex.org/W4387968165","https://openalex.org/W4390872383","https://openalex.org/W4390889813","https://openalex.org/W4393147891","https://openalex.org/W4393178779","https://openalex.org/W4402702918","https://openalex.org/W4402754049","https://openalex.org/W4402951568","https://openalex.org/W4403601061","https://openalex.org/W4403946918"],"related_works":[],"abstract_inverted_index":{"The":[0],"exorbitant":[1],"cost":[2],"of":[3,54,72,88,116,128,136],"training":[4],"Neural":[5,101],"Radiance":[6,102],"Fields":[7,103],"(NeRF)":[8],"makes":[9],"it":[10],"essential":[11],"to":[12,124],"protect":[13],"them":[14],"from":[15],"illegal":[16],"copying":[17],"and":[18,133],"unauthorized":[19],"usage.":[20],"Recent":[21],"attempts":[22],"at":[23],"NeRF":[24,56,67,91,130],"protection":[25],"utilize":[26],"watermarking":[27,57,92,131],"schemes,":[28],"which":[29,63,106],"subtly":[30],"alter":[31],"NeRFs":[32],"such":[33],"that":[34,40],"their":[35],"rendered":[36],"images":[37],"contain":[38],"watermarks":[39,112],"can":[41],"be":[42],"extracted":[43],"by":[44,110],"a":[45,65,73,78,95],"decoder.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50,84,97],"investigate":[51],"the":[52,69,89,114,126,134,139],"robustness":[53,135],"existing":[55,90,129],"schemes":[58],"against":[59,138],"surrogate":[60,66],"model":[61],"attacks,":[62],"train":[64],"using":[68],"input-output":[70],"pairs":[71],"victim":[74],"NeRF.":[75],"By":[76],"proposing":[77],"Feature-Modulation":[79],"Surrogate":[80],"Model":[81],"Attack":[82],"(FM-SMA),":[83],"successfully":[85],"crack":[86],"most":[87],"schemes.":[93],"As":[94],"remedy,":[96],"further":[98],"propose":[99],"Texture-Aware":[100],"Watermarking":[104],"(TA-NFW),":[105],"resists":[107],"FM-SMA":[108,141],"attacks":[109],"embedding":[111],"within":[113],"textures":[115],"NeRF-rendered":[117],"results.":[118],"Various":[119],"experiments":[120],"have":[121],"been":[122],"conducted":[123],"demonstrate":[125],"vulnerability":[127],"methods":[132],"TA-NFW":[137],"proposed":[140],"attack.":[142]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-30T00:00:00"}
