[1] |
Young T,Hazarika D,Poria S,et al.Recent trends in deep learning based natural language processing[J].IEEE Computational Intelligence Magazine,2018,13(3):55-75.
|
[2] |
陈海涵,吴国栋,李景霞,等.基于注意力机制的深度学习推荐研究进展[J].计算机工程与科学,2021,43(2):370-380.
|
|
Chen Hai-han,Wu Guo-dong,Li Jing-xia,et al.Research advances on deep learning recommendation based on attention mechanism[J].Computer Engineering & Science,2021,43(2):370-380.
|
[3] |
Hassaballah M,Awad A I.Deep learning in computer vision:Principles and applications[M].Boca Raton:CRC Press,2020.
|
[4] |
赵宝康,李晋文,杨帆,等.一种基于深度学习的遥感图像目标检测算法[J].计算机工程与科学,2019,41(12):2166-2172.
|
|
Zhao Bao-kang,Li Jin-wen,Yang Fan,et al.A deep learning based object detection algorithm for remote sensing images[J].Computer Engineering & Science,2019,41(12):2166-2172.
|
[5] |
Zhang J,Gu Z,Jang J,et al.Protecting intellectual property of deep neural networks with watermarking[C]∥Proc of the 2018 Asia Conference on Computer and Communications Security,2018:159-172.
|
[6] |
Cao X,Jia J,Gong N.IPGuard:Protecting intellectual property of deep neural networks via fingerprinting the classification boundary[C]∥Proc of the 2021 Asia Conference on Computer and Communications Security,2021:14-25.
|
[7] |
Xue M,Zhang Y,Wang J,et al.Intellectual property protection for deep learning models:Taxonomy,methods,attacks,and evaluations [J].IEEE Transactions on Artificial Intelligence,2021,3(6):908-923.
|
[8] |
Wong C,Li J,Fu W,et al.(α,k)-Anonymity:An enhanced k-anonymity model for privacy-preserving data publishing[C]∥Proc of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2006:754-759.
|
[9] |
Sei Y,Okumura H,Takenouchi T,et al.Anonymization of sensitive quasi-identifiers for l-diversity and t-closeness[J].IEEE Transactions on Dependable and Secure Computing,2019,16(4):580-593.
|
[10] |
Chen L,Lee W,Chang C,et al.Blockchain based searchable encryption for electronic health record sharing[J].Future Generation Computer Systems,2019,95(1):420-429.
|
[11] |
Li J,Yu Q,Zhang Y.Hierarchical attribute based encryption with continuous leakage-resilience[J].Information Sciences,2019,484:113-134.
|
[12] |
佘晓萌,杜洋,马文静,等.基于像素预测和块标记的图像密文可逆信息隐藏[J].计算机研究与发展,2022,59(9):2089-2100.
|
|
She Xiao-meng,Du Yang,Ma Wen-jing,et al.Reversible data hiding in encrypted images based on pixel prediction and block labeling[J].Journal of Computer Research and Deve- lopment,2022,59(9):2089-2100.
|
[13] |
Hoang M D.Dataset watermarking[D].Helsinki:Aalto University,2021.
|
[14] |
项世军,罗欣荣,石书协.一种同态加密域图像可逆水印算法[J].计算机学报,2016,39(3):571-581.
|
|
Xiang Shi-jun,Luo Xin-rong,Shi Shu-xie.A novel reversible image watermarking algorithm in homomorphic encrypted domain[J].Chinese Journal of Computers,2016,39(3):571-581.
|
[15] |
Li Y,Zhang Z,Bai J,et al.Open-sourced dataset protection via backdoor watermarking[J].arXiv:2010.05821,2020.
|
[16] |
Gu T,Liu K,Dolan-Gavitt B,et al.BadNets:Evaluating backdooring attacks on deep neural networks[J].IEEE Access,2019,7:47230-47244.
|
[17] |
Chen X,Liu C,Li B,et al.Targeted backdoor attacks on deep learning systems using data poisoning[J].arXiv:1712.05526,2017.
|
[18] |
Li Y,Li Y,Wu B,et al.Invisible backdoor attack with sample- specific triggers[J].arXiv:2012.03816,2021.
|
[19] |
Liu G,Xu T,Ma X,et al.Your model trains on my data? Protecting intellectual property of training data via membership fingerprint authentication[J].IEEE Transactions on Information Forensics and Security,2022,17(1):1024-1037.
|
[20] |
Li Y,Liu P,Jiang Y,et al.Visual privacy protection via mapping distortion[C]∥Proc of 2021 IEEE International Conference on Acoustics,Speech and Signal Processing,2021:3740-3744.
|
[21] |
Chen K,Zeng X,Ying Q,et al.Invertible image dataset protection[J].arXiv:2112.14420,2021.
|
[22] |
Zhao M,Wang B,Wang W,et al.Guided erasable adversarial attack (GEAA) towards shared data protection[J].IEEE Transactions on Information Forensics and Security,2022,17(1):2468-2482.
|
[23] |
冯乐,朱仁杰,吴汉舟,等.神经网络水印综述[J].应用科学学报,2021,39(6):881-892.
|
|
Feng Le,Zhu Ren-jie,Wu Han-zhou,et al.Survey of neural network watermarking[J].Journal of Applied Sciences,2021,39(6):881-892.
|
[24] |
Zhang J,Chen D,Liao J,et al.Model watermarking for image processing networks[C]∥Proc of the 34th AAAI Conference on Artificial Intelligence,2020:12805-12812.
|
[25] |
Renneberger O, Fischer P,Brox T.U-Net:Convolutional networks for biomedical image segmentation[C]∥Proc of the 18th International Conference on Medical Image Computing and Computer-Assisted Intervention,2015:234-241.
|
[26] |
Fan Q,Yang J,Hua G,et al.A generic deep architecture for single image reflection removal and image smoothing[C]∥Proc of 2017 IEEE International Conference on Computer Vision,2017:3238-3247.
|
[27] |
Isola P, Zhu J,Zhou T,et al.Image-to-image translation with conditional adversarial networks[C]∥Proc of 2016 IEEE Conference on Computer Vision and Pattern Recognition,2016:1125-1134.
|
[28] |
Deng J,Dong W,Socher R,et al.ImageNet:A large-scale hier- archical image database[C]∥Proc of 2009 IEEE Conference on Computer Vision and Pattern Recognition,2009:248-255.
|
[29] |
Everingham M, van Gool L,Williams C K I,et al.The PASCAL visual object classes (VOC) challenge[J].International Journal of Computer Vision,2010,88(2):303-338.
|