Cited By
View all- Zhu HLiang SHu WFangqi LJia JWang SCai JKankanhalli MPrabhakaran BBoll SSubramanian RZheng LSingh VCesar PXie LXu D(2024)Reliable Model Watermarking: Defending against Theft without Compromising on EvasionProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681610(10124-10133)Online publication date: 28-Oct-2024
- Rajendran SFarahmandi FTehranipoor M(2024)CAD Tools Pathway in Hardware Security2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID)10.1109/VLSID60093.2024.00063(342-347)Online publication date: 6-Jan-2024
- Lederer IMayer RRauber A(2024)Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and AttacksIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2023.327013535:10(13082-13100)Online publication date: Oct-2024
- Show More Cited By