检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王保卫[1] 郑伟钤 WANG Baowei;ZHENG Weiqian(School of Software,Nanjing University of Information Science and Technology,Nanjing 210044,China)
出 处:《信息安全学报》2024年第5期127-138,共12页Journal of Cyber Security
基 金:本课题得到国家自然科学基金等资助。
摘 要:作为自然语言处理(NLP)领域最强大的深度学习模型,Transformer在机器翻译和自然语言生成等任务中表现出色。同时,这意味着Transformer模型的知识产权(IPR)侵权风险也越来越大,尤其那些训练成本很高的大型模型。尽管目前存在针对卷积神经网络(ConvolutionalNeuralNetworks)和生成对抗网络(GenerativeAdversarialNetworks)等模型的所有权验证方法,但针对Transformer的工作还很欠缺。因此,为了完善Transformer的知识产权保护,让版权所有者在黑盒环境和白盒环境下都能够有效验证Transformer模型所有权,本文首先提出了一种基于额外关注力的白盒水印方案,该方案将所有者签名嵌入模型中并能够抵抗各种攻击,包括通常水印无法抵御的模糊攻击(不破坏现有水印而是加入攻击者水印造成所有权混淆)。之后,本文提出了一个基于混合触发器(HybridTriggers)的后门添加方案,该方案在不访问模型源码的黑盒情况下实现了对模型所有权的验证,具有良好的隐蔽性和抗去除性。此外,本文研究了一种新形式的模糊攻击,实验结果表明,面对这种攻击,本文提出的水印方案优于现有的深度神经网络水印方案。本文为Transformer提供了一个更鲁棒的水印方案,解决了现有技术的局限性,加强了Transformer的知识产权保护。As the most powerful deep learning model in natural language processing(NLP),Transformer has excellent performance in tasks such as machine translation and natural language generation.However,this also means that Transformer models are increasingly at risk of Intellectual Property Rights(IPR)infringement,especially for large models with extremely high training costs.Although ownership verification methods are available for models such as Convolutional Neural Networks(CNN)and Generative Adversarial Networks(GAN),protection work for Transformer is still lacking.Therefore,in order to effectively verify the ownership of Transformer models in both black-box and white-box settings,this paper first proposes a robust watermark that can resist various attacks,including ambiguity attacks(not destroying the existing watermark,but adding the attacker's watermark to cause ownership obfuscation),which normal watermarking schemes cannot resist,by adding Extra Attention as a white-box watermark carrier.Secondly,this paper implements a backdoor addition scheme based on Hybrid Triggers,which has good crypticity and removal resistance while achieving model ownership verification without access to the source code.In addition,a new form of ambiguity attack is investigated in this paper,and experimental results show that the watermarking scheme of this paper outperforms existing deep neural network watermarking schemes in the face of such attacks.The watermarking method proposed in this paper addresses the limitations of previous works,provides more robust watermarking for the Transformer,and enhances the intellectual property protection of the model.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.13