Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring. Adi, Y., Baum, C., Cissé, M., Pinkas, B., & Keshet, J. CoRR, 2018.
Link
Paper bibtex @article{journals/corr/abs-1802-04633,
added-at = {2018-08-13T00:00:00.000+0200},
author = {Adi, Yossi and Baum, Carsten and Cissé, Moustapha and Pinkas, Benny and Keshet, Joseph},
biburl = {https://www.bibsonomy.org/bibtex/2f66665369aee9fcdbc6c7a75ffcbb976/dblp},
ee = {http://arxiv.org/abs/1802.04633},
interhash = {d915128d5d37feb20b5dd84985d0b2c3},
intrahash = {f66665369aee9fcdbc6c7a75ffcbb976},
journal = {CoRR},
keywords = {dblp},
timestamp = {2018-08-14T13:17:30.000+0200},
title = {Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring.},
url = {http://dblp.uni-trier.de/db/journals/corr/corr1802.html#abs-1802-04633},
volume = {abs/1802.04633},
year = 2018
}
Downloads: 0
{"_id":"z4ewJ8TMRoD4waPxX","bibbaseid":"adi-baum-ciss-pinkas-keshet-turningyourweaknessintoastrengthwatermarkingdeepneuralnetworksbybackdooring-2018","authorIDs":[],"author_short":["Adi, Y.","Baum, C.","Cissé, M.","Pinkas, B.","Keshet, J."],"bibdata":{"bibtype":"article","type":"article","added-at":"2018-08-13T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Adi"],"firstnames":["Yossi"],"suffixes":[]},{"propositions":[],"lastnames":["Baum"],"firstnames":["Carsten"],"suffixes":[]},{"propositions":[],"lastnames":["Cissé"],"firstnames":["Moustapha"],"suffixes":[]},{"propositions":[],"lastnames":["Pinkas"],"firstnames":["Benny"],"suffixes":[]},{"propositions":[],"lastnames":["Keshet"],"firstnames":["Joseph"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2f66665369aee9fcdbc6c7a75ffcbb976/dblp","ee":"http://arxiv.org/abs/1802.04633","interhash":"d915128d5d37feb20b5dd84985d0b2c3","intrahash":"f66665369aee9fcdbc6c7a75ffcbb976","journal":"CoRR","keywords":"dblp","timestamp":"2018-08-14T13:17:30.000+0200","title":"Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring.","url":"http://dblp.uni-trier.de/db/journals/corr/corr1802.html#abs-1802-04633","volume":"abs/1802.04633","year":"2018","bibtex":"@article{journals/corr/abs-1802-04633,\n added-at = {2018-08-13T00:00:00.000+0200},\n author = {Adi, Yossi and Baum, Carsten and Cissé, Moustapha and Pinkas, Benny and Keshet, Joseph},\n biburl = {https://www.bibsonomy.org/bibtex/2f66665369aee9fcdbc6c7a75ffcbb976/dblp},\n ee = {http://arxiv.org/abs/1802.04633},\n interhash = {d915128d5d37feb20b5dd84985d0b2c3},\n intrahash = {f66665369aee9fcdbc6c7a75ffcbb976},\n journal = {CoRR},\n keywords = {dblp},\n timestamp = {2018-08-14T13:17:30.000+0200},\n title = {Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring.},\n url = {http://dblp.uni-trier.de/db/journals/corr/corr1802.html#abs-1802-04633},\n volume = {abs/1802.04633},\n year = 2018\n}\n\n","author_short":["Adi, Y.","Baum, C.","Cissé, M.","Pinkas, B.","Keshet, J."],"key":"journals/corr/abs-1802-04633","id":"journals/corr/abs-1802-04633","bibbaseid":"adi-baum-ciss-pinkas-keshet-turningyourweaknessintoastrengthwatermarkingdeepneuralnetworksbybackdooring-2018","role":"author","urls":{"Link":"http://arxiv.org/abs/1802.04633","Paper":"http://dblp.uni-trier.de/db/journals/corr/corr1802.html#abs-1802-04633"},"keyword":["dblp"],"downloads":0},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/benny pinkas?items=1000","creationDate":"2019-08-20T14:01:14.154Z","downloads":0,"keywords":["dblp"],"search_terms":["turning","weakness","strength","watermarking","deep","neural","networks","backdooring","adi","baum","cissé","pinkas","keshet"],"title":"Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring.","year":2018,"dataSources":["cqD7CZfhPQfyEKZAn"]}