检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张颖君[1,4] 陈恺 周赓[1,4] 吕培卓 刘勇 黄亮 Zhang Yingjun;Chen Kai;Zhou Geng;LüPeizhuo;Liu Yong;Huang Liang(Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing 100190;State Key Laboratory of Information Security(Institute of Information Engineering,Chinese Academy of Sciences),Beijing 100195;School of Cyber Security,University of Chinese Academy of Science,Beijing 100049;College of Computer Science and Technology,University of Chinese Academy of Sciences,Beijing 100049;Legendsec Information Technology(Beijing)Inc,Beijing 100015)
机构地区:[1]中国科学院软件研究所可信计算与信息保障实验室,北京100190 [2]信息安全国家重点实验室(中国科学院信息工程研究所),北京100195 [3]中国科学院大学网络空间安全学院,北京100049 [4]中国科学院大学计算机科学与技术学院,北京100049 [5]奇安信科技集团股份有限公司,北京100015
出 处:《计算机研究与发展》2021年第5期964-976,共13页Journal of Computer Research and Development
基 金:国家自然科学基金重点项目(U1836211);国家自然科学基金项目(62072448);北京市自然科学基金项目(JQ18011);中国科学院青年创新促进会优秀会员(Y202046);大数据协同安全国家工程实验室开放课题。
摘 要:随着深度神经网络的推广应用,训练后的神经网络模型已经成为一种重要的资产并为用户提供服务.服务商在提供服务的同时,也更多地关注其模型的版权保护,神经网络水印技术应运而生.首先,分析水印及其基本需求,并对神经网络水印涉及的相关技术进行介绍;对深度神经网络水印技术进行对比,并重点对白盒和黑盒水印进行详细分析;对神经网络水印攻击技术展开对比,并按照水印攻击目标的不同,对水印鲁棒性攻击、隐蔽性攻击、安全性攻击等技术进行分类介绍;最后对未来方向与挑战进行探讨.With the popularization and application of deep neural networks,the trained neural network model has become an important asset and has been provided as machine learning services(MLaaS)for users.However,as a special kind of user,attackers can extract the models when using the services.Considering the high value of the models and risks of being stolen,service providers start to pay more attention to the copyright protection of their models.The main technique is adopted from the digital watermark and applied to neural networks,called neural network watermarking.In this paper,we first analyze this kind of watermarking and show the basic requirements of the design.Then we introduce the related technologies involved in neural network watermarking.Typically,service providers embed watermarks in the neural networks.Once they suspect a model is stolen from them,they can verify the existence of the watermark in the model.Sometimes,the providers can obtain the suspected model and check the existence of watermarks from the model parameters(white-box).But sometimes,the providers cannot acquire the model.What they can only do is to check the input output pairs of the suspected model(black-box).We discuss these watermarking methods and potential attacks against the watermarks from the viewpoint of robustness,stealthiness,and security.In the end,we discuss future directions and potential challenges.
关 键 词:数字水印 深度神经网络 神经网络后门 神经网络水印 水印攻击
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.117.185.140