{"id":"https://openalex.org/W4414956235","doi":"https://doi.org/10.1109/tcsvt.2025.3619199","title":"Reversible Unlearnable Examples: Toward the Copyright Protection in Deep Learning Era","display_name":"Reversible Unlearnable Examples: Toward the Copyright Protection in Deep Learning Era","publication_year":2025,"publication_date":"2025-10-08","ids":{"openalex":"https://openalex.org/W4414956235","doi":"https://doi.org/10.1109/tcsvt.2025.3619199"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2025.3619199","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3619199","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086436467","display_name":"Binze Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":true,"raw_author_name":"Binze Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Macau, China","Faculty of Innovation Engineering, School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China"],"raw_orcid":"https://orcid.org/0009-0003-4984-3594","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Macau, China","institution_ids":["https://openalex.org/I111950717"]},{"raw_affiliation_string":"Faculty of Innovation Engineering, School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101902782","display_name":"Jinyu Tian","orcid":"https://orcid.org/0000-0002-2449-5277"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Jinyu Tian","raw_affiliation_strings":["School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Macau, China","Faculty of Innovation Engineering, School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China"],"raw_orcid":"https://orcid.org/0000-0002-2449-5277","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Macau, China","institution_ids":["https://openalex.org/I111950717"]},{"raw_affiliation_string":"Faculty of Innovation Engineering, School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066084943","display_name":"Xingrun Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I14894300","display_name":"Foshan University","ror":"https://ror.org/02xvvvp28","country_code":"CN","type":"education","lineage":["https://openalex.org/I14894300"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingrun Wang","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence of Foshan University, Foshan, China","School of Computer Science and Artificial Intelligence, FoShan University, FoShan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence of Foshan University, Foshan, China","institution_ids":["https://openalex.org/I14894300"]},{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence, FoShan University, FoShan, China","institution_ids":["https://openalex.org/I14894300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051381076","display_name":"Xiaochen Yuan","orcid":"https://orcid.org/0000-0002-7490-6695"},"institutions":[{"id":"https://openalex.org/I49835588","display_name":"Macao Polytechnic University","ror":"https://ror.org/02sf5td35","country_code":"MO","type":"education","lineage":["https://openalex.org/I49835588"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Xiaochen Yuan","raw_affiliation_strings":["Faculty of Applied Sciences, Macao Polytechnic University, Macau, China","Faculty of Applied Sciences of the Macao Polytechnic University, Macau, China"],"raw_orcid":"https://orcid.org/0000-0002-7490-6695","affiliations":[{"raw_affiliation_string":"Faculty of Applied Sciences, Macao Polytechnic University, Macau, China","institution_ids":["https://openalex.org/I49835588"]},{"raw_affiliation_string":"Faculty of Applied Sciences of the Macao Polytechnic University, Macau, China","institution_ids":["https://openalex.org/I49835588"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100641152","display_name":"Jianqing Li","orcid":"https://orcid.org/0000-0002-6768-1483"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Jianqing Li","raw_affiliation_strings":["School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Macau, China","Faculty of Innovation Engineering, School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China"],"raw_orcid":"https://orcid.org/0000-0002-6768-1483","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Macau, China","institution_ids":["https://openalex.org/I111950717"]},{"raw_affiliation_string":"Faculty of Innovation Engineering, School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China","institution_ids":["https://openalex.org/I111950717"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086436467"],"corresponding_institution_ids":["https://openalex.org/I111950717"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25946903,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"36","issue":"3","first_page":"3975","last_page":"3988"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.8618000149726868,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.8618000149726868,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.829200029373169,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.800000011920929,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7731000185012817},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7501999735832214},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.6808000206947327},{"id":"https://openalex.org/keywords/generalizability-theory","display_name":"Generalizability theory","score":0.597000002861023},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.47530001401901245},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.40799999237060547},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.4056999981403351},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.3734000027179718},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.3668000102043152}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7731000185012817},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.760200023651123},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7501999735832214},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.6808000206947327},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.597000002861023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5444999933242798},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5357999801635742},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.47530001401901245},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.40799999237060547},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.4056999981403351},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3734000027179718},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.3668000102043152},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.35589998960494995},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.34599998593330383},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33169999718666077},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.31439998745918274},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.2946999967098236},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.29260000586509705},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2838999927043915},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2799000144004822},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.2784999907016754},{"id":"https://openalex.org/C43091099","wikidata":"https://www.wikidata.org/wiki/Q1067788","display_name":"Through-the-lens metering","level":3,"score":0.2766000032424927},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2754000127315521},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2563999891281128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2025.3619199","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3619199","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5389250403","display_name":null,"funder_award_id":"62202009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5900724629","display_name":null,"funder_award_id":"2024A1515011755","funder_id":"https://openalex.org/F4320332533","funder_display_name":"Applied Basic Research Foundation of Yunnan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320332533","display_name":"Applied Basic Research Foundation of Yunnan Province","ror":"https://ror.org/030jhb479"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1977295328","https://openalex.org/W2040903332","https://openalex.org/W2097117768","https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2752782242","https://openalex.org/W2767471303","https://openalex.org/W2883233582","https://openalex.org/W2910152480","https://openalex.org/W2944049061","https://openalex.org/W2962785568","https://openalex.org/W2963163009","https://openalex.org/W2963446712","https://openalex.org/W2964043980","https://openalex.org/W2982163850","https://openalex.org/W2997594966","https://openalex.org/W3028710606","https://openalex.org/W3034856584","https://openalex.org/W3045370568","https://openalex.org/W3094821564","https://openalex.org/W3128902306","https://openalex.org/W3134175397","https://openalex.org/W3193750732","https://openalex.org/W4200633448","https://openalex.org/W4206589716","https://openalex.org/W4220765846","https://openalex.org/W4285267503","https://openalex.org/W4286865884","https://openalex.org/W4313147134","https://openalex.org/W4319350491","https://openalex.org/W4386071958","https://openalex.org/W4392642289","https://openalex.org/W4393379880","https://openalex.org/W4396667847","https://openalex.org/W4399729888","https://openalex.org/W4403791601","https://openalex.org/W4404914434","https://openalex.org/W4406526554"],"related_works":[],"abstract_inverted_index":{"Significant":[0],"advancements":[1],"in":[2,60,98],"deep":[3,61],"learning":[4,62],"have":[5],"been":[6],"made":[7],"possible":[8],"by":[9,83,143,178],"the":[10,16,47,109,115,132,145,149,154,157,162,169,187],"utilization":[11],"of":[12,19,49,117,124,138,148,153,165],"large":[13],"datasets,":[14],"underscoring":[15],"critical":[17],"importance":[18],"copyright":[20,58,105,202],"protection.":[21],"Adding":[22],"meticulously":[23],"designed":[24],"perturbations":[25,129,167],"to":[26,130,134,160,204],"examples,":[27],"making":[28],"them":[29],"unlearnable":[30,44,125,166],"has":[31],"become":[32],"a":[33,103,174],"crucial":[34],"approach":[35],"for":[36,42,108],"safeguarding":[37],"data":[38,50,55,72],"copyright.":[39],"Existing":[40],"methods":[41],"creating":[43],"examples":[45],"overlook":[46],"risk":[48],"leakage,":[51],"which":[52],"can":[53],"threaten":[54],"ownership.":[56],"Thus,":[57],"protection":[59,106,203],"faces":[63],"two":[64,78,180],"main":[65],"threats:":[66],"illegal":[67],"model":[68,119,133],"training":[69,120],"and":[70,89,151,192],"malicious":[71],"leakage.":[73],"We":[74],"investigate":[75],"that":[76,114,195],"these":[77],"threats":[79],"cannot":[80],"be":[81],"solved":[82],"straightforwardly":[84],"combining":[85],"existing":[86],"availability":[87],"attacks":[88],"watermarking":[90],"techniques":[91],"as":[92],"their":[93],"negative":[94],"interaction":[95],"effects.":[96],"Therefore,":[97],"this":[99],"paper,":[100],"we":[101,127,172],"propose":[102],"novel":[104],"mechanism":[107],"aforementioned":[110],"security":[111],"concerns.":[112],"Considering":[113],"prevention":[116],"unauthorized":[118],"requires":[121],"powerful":[122],"generalizability":[123],"perturbations,":[126],"generate":[128],"induce":[131],"learn":[135],"uncorrelated":[136],"features":[137],"input":[139,150],"images.":[140,205],"It":[141],"works":[142],"minimizing":[144],"mutual":[146],"information":[147],"output":[152],"model.":[155],"On":[156],"other":[158],"hand,":[159],"eliminate":[161],"side":[163],"impact":[164],"on":[168,186],"watermark":[170,182],"extraction,":[171],"design":[173],"dual":[175],"extraction":[176],"strategy":[177],"using":[179],"distinct":[181],"extractors.":[183],"Extensive":[184],"experiments":[185],"image":[188],"datasets":[189],"ImageNet,":[190],"CIFAR10,":[191],"Pets":[193],"show":[194],"our":[196],"proposed":[197],"method":[198],"could":[199],"provide":[200],"comprehensive":[201],"The":[206],"code":[207],"is":[208],"available":[209],"at":[210],"https://github.com/Yeah21/ReversibleUnlearnableExamples.":[211]},"counts_by_year":[],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-10-10T00:00:00"}
