{"id":"https://openalex.org/W4390658962","doi":"https://doi.org/10.1109/tai.2024.3351116","title":"Deep Model Intellectual Property Protection With Compression-Resistant Model Watermarking","display_name":"Deep Model Intellectual Property Protection With Compression-Resistant Model Watermarking","publication_year":2024,"publication_date":"2024-01-08","ids":{"openalex":"https://openalex.org/W4390658962","doi":"https://doi.org/10.1109/tai.2024.3351116"},"language":"en","primary_location":{"id":"doi:10.1109/tai.2024.3351116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tai.2024.3351116","pdf_url":null,"source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051783170","display_name":"Hewang Nie","orcid":"https://orcid.org/0000-0001-6652-4489"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hewang Nie","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048196007","display_name":"Songfeng Lu","orcid":"https://orcid.org/0000-0003-4489-2488"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songfeng Lu","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100460435","display_name":"Junjun Wu","orcid":"https://orcid.org/0000-0002-9140-2990"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjun Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100523132","display_name":"Zhu Jian-xin","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianxin Zhu","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051783170"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":13.1262,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.98988327,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"5","issue":"7","first_page":"3362","last_page":"3373"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9743000268936157,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.7896946668624878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.749993085861206},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7149045467376709},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5899752378463745},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5850485563278198},{"id":"https://openalex.org/keywords/invisibility","display_name":"Invisibility","score":0.559468686580658},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5572232604026794},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.47674641013145447},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2277897596359253}],"concepts":[{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.7896946668624878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.749993085861206},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7149045467376709},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5899752378463745},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5850485563278198},{"id":"https://openalex.org/C50962388","wikidata":"https://www.wikidata.org/wiki/Q762018","display_name":"Invisibility","level":2,"score":0.559468686580658},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5572232604026794},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.47674641013145447},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2277897596359253},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tai.2024.3351116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tai.2024.3351116","pdf_url":null,"source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1686810756","https://openalex.org/W1998497852","https://openalex.org/W2040903332","https://openalex.org/W2070665593","https://openalex.org/W2099563019","https://openalex.org/W2108598243","https://openalex.org/W2325939864","https://openalex.org/W2579318729","https://openalex.org/W2580726517","https://openalex.org/W2618530766","https://openalex.org/W2806082141","https://openalex.org/W2807363941","https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2952608669","https://openalex.org/W2982593110","https://openalex.org/W2990270730","https://openalex.org/W2990980946","https://openalex.org/W2994857739","https://openalex.org/W2996270246","https://openalex.org/W2997717738","https://openalex.org/W2999321020","https://openalex.org/W3000534541","https://openalex.org/W3000983008","https://openalex.org/W3003577920","https://openalex.org/W3042825842","https://openalex.org/W3053555102","https://openalex.org/W3087685156","https://openalex.org/W3092280023","https://openalex.org/W3098772125","https://openalex.org/W3107337211","https://openalex.org/W3108442046","https://openalex.org/W3132481243","https://openalex.org/W3133747496","https://openalex.org/W3135872251","https://openalex.org/W3140988292","https://openalex.org/W3158286879","https://openalex.org/W3168768313","https://openalex.org/W3178167397","https://openalex.org/W3192670305","https://openalex.org/W3196774785","https://openalex.org/W3206001941","https://openalex.org/W4214737857","https://openalex.org/W4214919592","https://openalex.org/W4224932545","https://openalex.org/W4226248369","https://openalex.org/W6637373629","https://openalex.org/W6747838042","https://openalex.org/W6775611046","https://openalex.org/W6778883912","https://openalex.org/W6792327856","https://openalex.org/W6797626799"],"related_works":["https://openalex.org/W2127066923","https://openalex.org/W429496918","https://openalex.org/W2947309736","https://openalex.org/W4221056335","https://openalex.org/W2357134306","https://openalex.org/W2151242554","https://openalex.org/W2851771174","https://openalex.org/W2990661636","https://openalex.org/W2736876455","https://openalex.org/W2384571902"],"abstract_inverted_index":{"Deep":[0],"learning":[1,22,46,174],"is":[2,27,61,80,137],"considered":[3],"a":[4,109,133],"promising":[5],"technology":[6],"for":[7,176],"empowering":[8],"the":[9,18,24,53,67,83,141,155],"Industrial":[10],"Internet":[11],"of":[12,20,55,62,73,82,157,168],"Things":[13],"(IIoT)":[14],"with":[15,150],"intelligence.":[16],"However,":[17,90],"application":[19],"deep":[21,45,74,173],"in":[23,48,170],"industrial":[25],"IoT":[26,49],"accompanied":[28],"by":[29,97],"significant":[30],"security":[31],"challenges.":[32],"Therefore,":[33],"it":[34],"has":[35,178],"become":[36],"crucial":[37],"to":[38,42,66,131,160],"investigate":[39],"effective":[40],"measures":[41],"provide":[43],"secure":[44,172],"services":[47,175],"applications.":[50],"In":[51],"particular,":[52],"issue":[54],"intellectual":[56,114],"property":[57,115],"rights":[58],"(IPR)":[59],"protection":[60,116],"great":[63],"concern":[64],"due":[65],"illegal":[68],"copying,":[69],"redistribution,":[70],"or":[71],"misuse":[72],"neural":[75,111,142],"network":[76,112,143],"(DNN)":[77],"models,":[78],"which":[79,120,136],"one":[81],"common":[84],"ways":[85],"that":[86],"attackers":[87],"target":[88],"DNNs.":[89],"existing":[91],"defense":[92],"mechanisms":[93],"are":[94],"easily":[95],"detectable":[96],"attackers,":[98],"rendering":[99],"them":[100],"ineffective.":[101],"To":[102],"address":[103],"this":[104,106],"issue,":[105],"paper":[107],"presents":[108],"novel":[110],"model":[113,144],"scheme,":[117],"called":[118],"CRMW,":[119],"employs":[121],"an":[122,127],"image":[123,128,161],"steganography":[124],"algorithm":[125,130],"and":[126,163],"compression":[129,162],"generate":[132],"watermark":[134],"dataset,":[135],"subsequently":[138],"embedded":[139],"into":[140],"using":[145],"feature":[146],"consistency":[147],"training.":[148],"Compared":[149],"prior":[151],"efforts,":[152],"CRMW":[153,169],"offers":[154],"advantage":[156],"being":[158],"resistant":[159],"maintaining":[164],"invisibility.":[165],"The":[166],"effectiveness":[167],"providing":[171],"IIoT":[177],"been":[179],"validated":[180],"through":[181],"numerous":[182],"experimental":[183],"analyses.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":9}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
