{"id":"https://openalex.org/W4415747925","doi":"https://doi.org/10.1109/tdsc.2025.3627978","title":"Ownership Verification of Your NLG Models With Semantic Combination Watermarks","display_name":"Ownership Verification of Your NLG Models With Semantic Combination Watermarks","publication_year":2025,"publication_date":"2025-10-31","ids":{"openalex":"https://openalex.org/W4415747925","doi":"https://doi.org/10.1109/tdsc.2025.3627978"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3627978","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3627978","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011130731","display_name":"Chunlong Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunlong Xie","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China","College of Computer Science, Chongqing University, China"],"raw_orcid":"https://orcid.org/0009-0000-3282-8062","affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"College of Computer Science, Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079461118","display_name":"Tao Xiang","orcid":"https://orcid.org/0000-0002-9439-4623"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Xiang","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China","College of Computer Science, Chongqing University, China"],"raw_orcid":"https://orcid.org/0000-0002-9439-4623","affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"College of Computer Science, Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073264981","display_name":"Shangwei Guo","orcid":"https://orcid.org/0000-0002-6443-5308"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shangwei Guo","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China","College of Computer Science, Chongqing University, China"],"raw_orcid":"https://orcid.org/0000-0002-6443-5308","affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"College of Computer Science, Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023902836","display_name":"Biwen Chen","orcid":"https://orcid.org/0000-0002-7314-8271"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biwen Chen","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China","College of Computer Science, Chongqing University, China"],"raw_orcid":"https://orcid.org/0000-0002-7314-8271","affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"College of Computer Science, Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603261","display_name":"Ning Wang","orcid":"https://orcid.org/0000-0003-1381-7952"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Wang","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China","College of Computer Science, Chongqing University, China"],"raw_orcid":"https://orcid.org/0000-0003-1381-7952","affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"College of Computer Science, Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100758093","display_name":"Jiwei Li","orcid":"https://orcid.org/0000-0002-1903-0731"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiwei Li","raw_affiliation_strings":["Shannon.AI, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shannon.AI, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101591101","display_name":"Tianwei Zhang","orcid":"https://orcid.org/0000-0001-6595-6650"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Tianwei Zhang","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Singapore","School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0001-6595-6650","affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5011130731"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16172303,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"2473","last_page":"2488"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8809000253677368,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8809000253677368,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.01510000042617321,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.013199999928474426,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.757099986076355},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7002000212669373},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5291000008583069},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.46959999203681946},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4643999934196472},{"id":"https://openalex.org/keywords/natural-language-generation","display_name":"Natural language generation","score":0.4595000147819519},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.45660001039505005},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3977000117301941}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8185999989509583},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.757099986076355},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7002000212669373},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5291000008583069},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48840001225471497},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.46959999203681946},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4643999934196472},{"id":"https://openalex.org/C2776187449","wikidata":"https://www.wikidata.org/wiki/Q1513879","display_name":"Natural language generation","level":3,"score":0.4595000147819519},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.45660001039505005},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45570001006126404},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3977000117301941},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.38749998807907104},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.36579999327659607},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.36419999599456787},{"id":"https://openalex.org/C2781249084","wikidata":"https://www.wikidata.org/wiki/Q908656","display_name":"Preference","level":2,"score":0.35910001397132874},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3285999894142151},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.32100000977516174},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.2919999957084656},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.27950000762939453},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2513999938964844},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3627978","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3627978","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3550020321","display_name":null,"funder_award_id":"U21A20463","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6130330936","display_name":null,"funder_award_id":"62572079","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8711352089","display_name":null,"funder_award_id":"62472057","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1902237438","https://openalex.org/W2101105183","https://openalex.org/W2158518777","https://openalex.org/W2250539671","https://openalex.org/W2604799547","https://openalex.org/W2807363941","https://openalex.org/W2883233582","https://openalex.org/W2888482885","https://openalex.org/W2891177506","https://openalex.org/W2896457183","https://openalex.org/W2933138175","https://openalex.org/W2963540401","https://openalex.org/W2963929190","https://openalex.org/W2970641574","https://openalex.org/W3034999214","https://openalex.org/W3035367371","https://openalex.org/W3100439847","https://openalex.org/W3102645206","https://openalex.org/W3129468510","https://openalex.org/W3170572542","https://openalex.org/W3174538263","https://openalex.org/W3192504716","https://openalex.org/W3212213895","https://openalex.org/W3213508244","https://openalex.org/W4212831703","https://openalex.org/W4226014375","https://openalex.org/W4235505822","https://openalex.org/W4285230500","https://openalex.org/W4383199672","https://openalex.org/W4385245566","https://openalex.org/W4385572007","https://openalex.org/W4385885222","https://openalex.org/W4385988784","https://openalex.org/W4387428051","https://openalex.org/W4393160247","https://openalex.org/W4401042907","https://openalex.org/W7133200867"],"related_works":[],"abstract_inverted_index":{"Natural":[0],"Language":[1],"Generation":[2],"(NLG)":[3],"applications":[4],"have":[5],"gained":[6],"immense":[7],"popularity":[8],"due":[9],"to":[10,63,104,133,170,191],"the":[11,23,139,152,173,183],"utilization":[12],"of":[13,26,34,39,85,185],"powerful":[14],"deep":[15],"learning":[16],"techniques":[17,57],"and":[18,66,78,107,179],"large":[19],"training":[20],"corpora.":[21],"However,":[22],"increasing":[24],"prevalence":[25],"NLG":[27,45,70,86,113,158,186],"models":[28,159,187],"also":[29],"poses":[30],"a":[31,51,75,91,100,116,127,147],"significant":[32],"risk":[33],"unauthorized":[35],"access":[36],"or":[37],"theft":[38],"intellectual":[40],"property":[41],"(IP).":[42],"To":[43,137],"safeguard":[44],"models,":[46],"watermarking":[47,56,80],"has":[48],"emerged":[49],"as":[50],"promising":[52],"tool,":[53],"but":[54,130],"existing":[55],"based":[58],"on":[59],"pre-processing":[60],"are":[61,124,168],"prone":[62],"attacker":[64],"detection":[65],"can":[67],"potentially":[68],"harm":[69],"applications.":[71],"This":[72,109],"paper":[73],"proposes":[74],"novel,":[76],"semantic,":[77],"stealthy":[79,190],"scheme":[81,110,175],"for":[82,119],"IP":[83,184],"protection":[84],"models.":[87],"Our":[88],"approach":[89],"embeds":[90],"semantic":[92,106,121],"combination":[93],"water":[94],"mark,":[95],"which":[96,123],"is":[97,143,154,176],"generated":[98],"through":[99,146],"multi-stage":[101],"process":[102],"designed":[103],"be":[105],"stealthy.":[108],"endows":[111],"an":[112],"model":[114,135],"with":[115],"verifiable":[117],"preference":[118],"specific":[120],"combinations,":[122],"initiated":[125],"by":[126],"foundational":[128],"pattern":[129],"holistically":[131],"constructed":[132],"preserve":[134],"functionality.":[136],"enhance":[138],"robustness,":[140],"data":[141],"embedding":[142],"systematically":[144],"performed":[145],"masked":[148],"location":[149],"injection.":[150],"Consequently,":[151],"watermark":[153],"seamlessly":[155],"integrated":[156],"into":[157],"without":[160],"misleading":[161],"their":[162],"original":[163],"attention":[164],"mechanism.":[165],"Comprehensive":[166],"experiments":[167],"conducted":[169],"demonstrate":[171],"that":[172],"proposed":[174],"highly":[177],"effective":[178],"robust":[180],"in":[181],"protecting":[182],"while":[188],"remaining":[189],"potential":[192],"attackers.":[193]},"counts_by_year":[],"updated_date":"2026-03-17T06:59:57.516163","created_date":"2025-10-31T00:00:00"}
