Cited By
View all- He CBai XMa XZhu BHu PFu JJin HZhang DCai JKankanhalli MPrabhakaran BBoll SSubramanian RZheng LSingh VCesar PXie LXu D(2024)Towards Stricter Black-box Integrity Verification of Deep Neural Network ModelsProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681691(9875-9884)Online publication date: 28-Oct-2024
- Liu WZhong SGurrin CKongkachandra RSchoeffmann KDang-Nguyen DRossetto LSatoh SZhou L(2024)MarginFinger: Controlling Generated Fingerprint Distance to Classification boundary Using Conditional GANsProceedings of the 2024 International Conference on Multimedia Retrieval10.1145/3652583.3658058(129-136)Online publication date: 30-May-2024
- Yao HLi ZHuang KLou JQin ZRen K(2024)RemovalNet: DNN Fingerprint Removal AttacksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.331506421:4(2645-2658)Online publication date: Jul-2024
- Show More Cited By