{"id":"https://openalex.org/W4411688479","doi":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11036922","title":"AI Model Signing for Integrity Verification","display_name":"AI Model Signing for Integrity Verification","publication_year":2025,"publication_date":"2025-06-03","ids":{"openalex":"https://openalex.org/W4411688479","doi":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11036922"},"language":"en","primary_location":{"id":"doi:10.1109/eucnc/6gsummit63408.2025.11036922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11036922","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Joint European Conference on Networks and Communications &amp;amp; 6G Summit (EuCNC/6G Summit)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117255665","display_name":"Adrian Brodzik","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]},{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Adrian Brodzik","raw_affiliation_strings":["Institute of Computer Science, Warsaw University of Technology,Warsaw,Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Warsaw University of Technology,Warsaw,Poland","institution_ids":["https://openalex.org/I108403487","https://openalex.org/I4210087266"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089469997","display_name":"Wojciech Mazurczyk","orcid":"https://orcid.org/0000-0002-8509-4127"},"institutions":[{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]},{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Wojciech Mazurczyk","raw_affiliation_strings":["Institute of Computer Science, Warsaw University of Technology,Warsaw,Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Warsaw University of Technology,Warsaw,Poland","institution_ids":["https://openalex.org/I108403487","https://openalex.org/I4210087266"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5117255665"],"corresponding_institution_ids":["https://openalex.org/I108403487","https://openalex.org/I4210087266"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2035227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"757","last_page":"762"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9394999742507935,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9394999742507935,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6876848936080933},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4492914080619812},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.374267041683197},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.265363872051239}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6876848936080933},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4492914080619812},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.374267041683197},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.265363872051239}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eucnc/6gsummit63408.2025.11036922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11036922","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Joint European Conference on Networks and Communications &amp;amp; 6G Summit (EuCNC/6G Summit)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2766980353","https://openalex.org/W2785134958","https://openalex.org/W2915382319","https://openalex.org/W3013803040","https://openalex.org/W3217666283","https://openalex.org/W4210419307","https://openalex.org/W4221090794","https://openalex.org/W4308463084","https://openalex.org/W4390497390","https://openalex.org/W4399184120","https://openalex.org/W4399422839","https://openalex.org/W4400277247","https://openalex.org/W4403594777","https://openalex.org/W4404037422","https://openalex.org/W6753598056","https://openalex.org/W6853136885","https://openalex.org/W6873432504"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,162],"availability":[1],"of":[2,17,68,95,109,170],"open-source":[3],"resources,":[4],"datasets,":[5],"and":[6,43,48,84,107,149,160,181],"pre-trained":[7],"Artificial":[8],"Intelligence":[9],"(AI)":[10],"models":[11,81,178],"has":[12,26],"increased":[13],"the":[14,66,105,168],"overall":[15],"adoption":[16],"AI":[18,45,80,132,171],"systems":[19],"across":[20],"various":[21],"sectors.":[22],"However,":[23],"this":[24,61,63],"growth":[25],"introduced":[27],"significant":[28],"security":[29,169],"challenges":[30],"similar":[31],"to":[32,53,77,166],"those":[33],"faced":[34],"in":[35,104,112],"software":[36],"development.":[37],"Threat":[38],"actors":[39],"can":[40],"infiltrate":[41],"public":[42],"private":[44],"model":[46,69,100,172],"repositories":[47,173],"introduce":[49],"malicious":[50,116],"models,":[51],"leading":[52],"arbitrary":[54],"code":[55],"execution":[56],"upon":[57],"deserialization.":[58],"To":[59],"address":[60],"issue,":[62],"paper":[64],"highlights":[65],"importance":[67],"signing,":[70],"a":[71],"method":[72],"that":[73,86,176],"uses":[74],"digital":[75],"signatures":[76],"confirm":[78],"where":[79,115],"come":[82],"from":[83],"ensure":[85],"they":[87],"have":[88],"not":[89],"been":[90],"tampered":[91],"with.":[92],"Taking":[93],"advantage":[94],"Public":[96],"Key":[97],"Infrastructure":[98],"(PKI),":[99],"signing":[101,129],"builds":[102],"trust":[103],"development":[106],"use":[108],"AI,":[110],"especially":[111],"critical":[113],"areas":[114],"alternations":[117],"could":[118],"cause":[119],"serious":[120],"problems.":[121],"In":[122],"addition,":[123],"we":[124],"investigate":[125],"four":[126],"novel":[127],"cryptographic":[128],"approaches":[130],"for":[131,184],"models:":[133],"Single":[134,136,146,152],"Hash":[135],"Signature":[137,147,153],"(SHSS),":[138],"Multiple":[139,141,144,150],"Hashes":[140,145,151],"Signatures":[142],"(MHMS),":[143],"(MHSS),":[148],"Chain":[154],"(MHSSC),":[155],"assessing":[156],"their":[157],"security,":[158],"performance,":[159],"usability.":[161],"suggested":[163],"methods":[164],"aim":[165],"enhance":[167],"by":[174],"ensuring":[175],"distributed":[177],"are":[179],"traceable":[180],"verifiably":[182],"safe":[183],"deployment.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
