Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/159773
Title: | Ownership verification of DNN architectures via hardware cache side channels | Authors: | Lou, Xiaoxuan Guo, Shangwei Li, Jiwei Zhang, Tianwei |
Keywords: | Engineering::Computer science and engineering Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence |
Issue Date: | 2022 | Source: | Lou, X., Guo, S., Li, J. & Zhang, T. (2022). Ownership verification of DNN architectures via hardware cache side channels. IEEE Transactions On Circuits and Systems for Video Technology. https://dx.doi.org/10.1109/TCSVT.2022.3184644 | Project: | NRF2018NCR- NCR009-0001 MOE-T2EP20121-0006 RS02/19 U21A20463 & 62102052 cstc2021jcyj-msxmX0744 |
Journal: | IEEE Transactions on Circuits and Systems for Video Technology | Abstract: | Deep Neural Networks (DNN) are gaining higher commercial values in computer vision applications, e.g., image classification, video analytics, etc. This calls for urgent demands of the intellectual property (IP) protection of DNN models. In this paper, we present a novel watermarking scheme to achieve the ownership verification of DNN architectures. Existing works all embedded watermarks into the model parameters while treating the architecture as public property. These solutions were proven to be vulnerable by an adversary to detect or remove the watermarks. In contrast, we claim the model architectures as an important IP for model owners, and propose to implant watermarks into the architectures. We design new algorithms based on Neural Architecture Search (NAS) to generate watermarked architectures, which are unique enough to represent the ownership, while maintaining high model usability. Such watermarks can be extracted via side-channel-based model extraction techniques with high fidelity. We conduct comprehensive experiments on watermarked CNN models for image classification tasks and the experimental results show our scheme has negligible impact on the model performance, and exhibits strong robustness against various model transformations and adaptive attacks. | URI: | https://hdl.handle.net/10356/159773 | ISSN: | 1051-8215 | DOI: | 10.1109/TCSVT.2022.3184644 | Schools: | School of Computer Science and Engineering | Rights: | © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TCSVT.2022.3184644. | Fulltext Permission: | open | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Journal Articles |
SCOPUSTM
Citations
20
12
Updated on Mar 21, 2025
Web of ScienceTM
Citations
50
1
Updated on Oct 17, 2023
Page view(s)
244
Updated on Mar 22, 2025
Download(s) 50
138
Updated on Mar 22, 2025
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.