Model Copyright Protection in Buyer-seller Environment (2312.05262v1)
Abstract: Training a deep neural network (DNN) requires a high computational cost. Buying models from sellers with a large number of computing resources has become prevailing. However, the buyer-seller environment is not always trusted. To protect the neural network models from leaking in an untrusted environment, we propose a novel copyright protection scheme for DNN using an input-sensitive neural network (ISNN). The main idea of ISNN is to make a DNN sensitive to the key and copyright information. Therefore, only the buyer with a correct key can utilize the ISNN. During the training phase, we add a specific perturbation to the clean images and mark them as legal inputs, while the other inputs are treated as illegal input. We design a loss function to make the outputs of legal inputs close to the true ones, while the illegal inputs are far away from true results. Experimental results demonstrate that the proposed scheme is effective, valid, and secure.
- “End-to-end learning method for self-driving cars with trajectory recovery using a path-following function,” in 2019 International Joint Conference on Neural Networks (IJCNN). IEEE, 2019, pp. 1–8.
- “Deep face recognition,” in BMVC, 2015, pp. 41.1–41.12.
- “Going deeper with convolutions,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1–9.
- “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
- “The rijndael block cipher: Aes proposal,” in First candidate conference (AeS1), 1999, pp. 343–348.
- “A proposed mode for triple-des encryption,” IBM Journal of Research and Development, vol. 40, no. 2, pp. 253–262, 1996.
- “Twofish: a 128-bit block cipher,” AES submission, 1998.
- “Hardware-assisted intellectual property protection of deep learning models,” in 2020 57th ACM/IEEE Design Automation Conference (DAC). IEEE, 2020, pp. 1–6.
- “Probabilistic selective encryption of convolutional neural networks for hierarchical services,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021, pp. 2205–2214.
- “Watermarking deep neural networks for embedded systems,” in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2018, pp. 1–8.
- “Have you stolen my model? evasion attacks against deep neural network watermarking techniques,” CoRR, vol. abs/1809.00615, 2018.
- “Adversarial frontier stitching for remote neural network watermarking,” Neural Computing and Applications, vol. 32, no. 13, pp. 9233–9244, 2020.
- “Deepsigns: An end-to-end watermarking framework for ownership protection of deep neural networks,” in Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019, pp. 485–497.
- “Universal adversarial perturbations,” in Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), 2017, pp. 1765–1773.
- Andrew Chi-Chih Yao, “How to generate and exchange secrets,” in 27th Annual Symposium on Foundations of Computer Science (SFCS). IEEE, 1986, pp. 162–167.
- Craig Gentry, “Fully homomorphic encryption using ideal lattices,” in Proceedings of the forty-first annual ACM symposium on Theory of computing, 2009, pp. 169–178.
- Adi Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.