Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/159773
Title: Ownership verification of DNN architectures via hardware cache side channels
Authors: Lou, Xiaoxuan
Guo, Shangwei
Li, Jiwei
Zhang, Tianwei
Keywords: Engineering::Computer science and engineering
Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence
Issue Date: 2022
Source: Lou, X., Guo, S., Li, J. & Zhang, T. (2022). Ownership verification of DNN architectures via hardware cache side channels. IEEE Transactions On Circuits and Systems for Video Technology. https://dx.doi.org/10.1109/TCSVT.2022.3184644
Project: NRF2018NCR- NCR009-0001 
MOE-T2EP20121-0006
RS02/19
U21A20463 & 62102052
cstc2021jcyj-msxmX0744
Journal: IEEE Transactions on Circuits and Systems for Video Technology
Abstract: Deep Neural Networks (DNN) are gaining higher commercial values in computer vision applications, e.g., image classification, video analytics, etc. This calls for urgent demands of the intellectual property (IP) protection of DNN models. In this paper, we present a novel watermarking scheme to achieve the ownership verification of DNN architectures. Existing works all embedded watermarks into the model parameters while treating the architecture as public property. These solutions were proven to be vulnerable by an adversary to detect or remove the watermarks. In contrast, we claim the model architectures as an important IP for model owners, and propose to implant watermarks into the architectures. We design new algorithms based on Neural Architecture Search (NAS) to generate watermarked architectures, which are unique enough to represent the ownership, while maintaining high model usability. Such watermarks can be extracted via side-channel-based model extraction techniques with high fidelity. We conduct comprehensive experiments on watermarked CNN models for image classification tasks and the experimental results show our scheme has negligible impact on the model performance, and exhibits strong robustness against various model transformations and adaptive attacks.
URI: https://hdl.handle.net/10356/159773
ISSN: 1051-8215
DOI: 10.1109/TCSVT.2022.3184644
Schools: School of Computer Science and Engineering 
Rights: © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TCSVT.2022.3184644.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Journal Articles

Files in This Item:
File Description SizeFormat 
main.pdf1.65 MBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 20

12
Updated on Mar 21, 2025

Web of ScienceTM
Citations 50

1
Updated on Oct 17, 2023

Page view(s)

244
Updated on Mar 22, 2025

Download(s) 50

138
Updated on Mar 22, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.