{"id":"https://openalex.org/W4407466294","doi":"https://doi.org/10.1109/sin63213.2024.10871674","title":"Recommendation System Model Ownership Verification via Non-Influential Watermarking","display_name":"Recommendation System Model Ownership Verification via Non-Influential Watermarking","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4407466294","doi":"https://doi.org/10.1109/sin63213.2024.10871674"},"language":"en","primary_location":{"id":"doi:10.1109/sin63213.2024.10871674","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin63213.2024.10871674","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 17th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065841845","display_name":"Xiaocui Dang","orcid":"https://orcid.org/0000-0001-8734-6247"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Xiaocui Dang","raw_affiliation_strings":["University of Technology Sydney,Sydney,Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045431254","display_name":"Priyadarsi Nanda","orcid":"https://orcid.org/0000-0002-5748-155X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Priyadarsi Nanda","raw_affiliation_strings":["University of Technology Sydney,Sydney,Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043431594","display_name":"Heng Xu","orcid":"https://orcid.org/0000-0001-5642-6543"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Heng Xu","raw_affiliation_strings":["University of Technology Sydney,Sydney,Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034263067","display_name":"Haiyu Deng","orcid":"https://orcid.org/0000-0002-7513-4009"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Haiyu Deng","raw_affiliation_strings":["University of Technology Sydney,Sydney,Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019420922","display_name":"Manoranjan Mohanty","orcid":"https://orcid.org/0000-0002-0258-4586"},"institutions":[{"id":"https://openalex.org/I4210089979","display_name":"Carnegie Mellon University Qatar","ror":"https://ror.org/00az5dt38","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210089979","https://openalex.org/I74973139"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Manoranjan Mohanty","raw_affiliation_strings":["Carnegie Mellon University in Qatar"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University in Qatar","institution_ids":["https://openalex.org/I4210089979"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065841845"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28227162,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8718019723892212},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6669625639915466},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41279760003089905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19490566849708557},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09709826111793518}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8718019723892212},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6669625639915466},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41279760003089905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19490566849708557},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09709826111793518}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sin63213.2024.10871674","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin63213.2024.10871674","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 17th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2219888463","https://openalex.org/W2579318729","https://openalex.org/W2605350416","https://openalex.org/W2806082141","https://openalex.org/W2892212215","https://openalex.org/W2892948265","https://openalex.org/W2997717738","https://openalex.org/W3133747496","https://openalex.org/W3173922709","https://openalex.org/W3185788529","https://openalex.org/W3206880386","https://openalex.org/W4238136161","https://openalex.org/W4282027681","https://openalex.org/W4313558118","https://openalex.org/W4320005719","https://openalex.org/W4323345707","https://openalex.org/W4362714395","https://openalex.org/W4367368092","https://openalex.org/W4385724030","https://openalex.org/W4386798592","https://openalex.org/W4387096880","https://openalex.org/W4390551995","https://openalex.org/W4392976075","https://openalex.org/W4393379880","https://openalex.org/W4394939124","https://openalex.org/W4394994587"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1846726187"],"abstract_inverted_index":{"While":[0],"deep":[1],"learning-based":[2],"recommendation":[3,9,67,73],"systems":[4],"have":[5,95],"achieved":[6],"great":[7],"success,":[8],"system":[10,68,74],"models":[11],"are":[12,40],"also":[13],"at":[14],"serious":[15],"risk":[16],"of":[17,30,66,81,108],"intellectual":[18],"property":[19],"infringement.":[20],"Current":[21],"model":[22,37,75,92],"watermarking":[23,38,59],"research":[24],"faces":[25],"significant":[26],"challenges":[27],"in":[28],"terms":[29],"fidelity,":[31],"invisibility,":[32],"and":[33,106],"efficiency.":[34],"Additionally,":[35],"existing":[36],"techniques":[39],"predominantly":[41],"applied":[42],"to":[43,49,62,102],"image":[44],"data,":[45],"with":[46],"limited":[47],"applicability":[48],"tabular":[50],"data.":[51],"In":[52],"this":[53],"paper,":[54],"we":[55,71],"introduce":[56],"an":[57],"innovative":[58],"framework":[60],"designed":[61],"safeguard":[63],"the":[64,85,104],"ownership":[65,76],"models.":[69],"Specifically,":[70],"verify":[72],"by":[77],"embedding":[78],"a":[79],"type":[80],"backdoor":[82],"watermark":[83],"into":[84],"training":[86],"dataset,":[87],"which":[88],"does":[89],"not":[90],"affect":[91],"performance.":[93],"We":[94],"conducted":[96],"experiments":[97],"on":[98],"several":[99],"classical":[100],"datasets":[101],"validate":[103],"reliability":[105],"effectiveness":[107],"our":[109],"approach.":[110]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
