Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security 2022
DOI: 10.1145/3531536.3532950
|View full text |Cite
|
Sign up to set email alerts
|

BlindSpot: Watermarking Through Fairness

Abstract: With the increasing development of machine learning models in daily businesses, a strong need for intellectual property protection arised. For this purpose, current works suggest to leverage backdoor techniques to embed a watermark into the model, by overfitting to a set of particularly crafted and secret input-output pairs called triggers. By sending verification queries containing triggers, the model owner can analyse the behavior of any suspect model on the queries to claim its ownership. However, when it c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 24 publications
(37 reference statements)
0
0
0
Order By: Relevance
“…Pruning Attack: Setting the less useful weights of the model to zero. [15,[59][60][61][62][63][64][64][65][66][67][68][69][70][71] and Black-Box [65,[72][73][74][75][76][77][78][79][80][81][82][83][84][85] watermarking. Each technique is defined by the type of access to the model parameters during the verification process.…”
mentioning
confidence: 99%
“…Pruning Attack: Setting the less useful weights of the model to zero. [15,[59][60][61][62][63][64][64][65][66][67][68][69][70][71] and Black-Box [65,[72][73][74][75][76][77][78][79][80][81][82][83][84][85] watermarking. Each technique is defined by the type of access to the model parameters during the verification process.…”
mentioning
confidence: 99%