Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning
dc.contributor.author | Regazzoni, Francesco | |
dc.contributor.author | Palmieri, Paolo | |
dc.contributor.author | Smailbegovic, Fethulah | |
dc.contributor.author | Cammarota, Rosario | |
dc.contributor.author | Polian, Ilia | |
dc.contributor.funder | Horizon 2020 | en |
dc.contributor.funder | Science Foundation Ireland | en |
dc.date.accessioned | 2021-09-29T14:07:20Z | |
dc.date.available | 2021-09-29T14:07:20Z | |
dc.date.issued | 2021-04-04 | |
dc.date.updated | 2021-09-29T10:03:20Z | |
dc.description.abstract | Artificial intelligence (AI) algorithms achieve outstanding results in many application domains such as computer vision and natural language processing. The performance of AI models is the outcome of complex and costly model architecture design and training processes. Hence, it is paramount for model owners to protect their AI models from piracy – model cloning, illegitimate distribution and use. IP protection mechanisms have been applied to AI models, and in particular to deep neural networks, to verify the model ownership. State-of-the-art AI model ownership protection techniques have been surveyed. The pros and cons of AI model ownership protection have been reported. The majority of previous works are focused on watermarking, while more advanced methods such fingerprinting and attestation are promising but not yet explored in depth. This study has been concluded by discussing possible research directions in the area. | en |
dc.description.sponsorship | Science Foundation Ireland (Grant no.12/RC/2289-P2, Insight Centre for Data Analytics) | en |
dc.description.status | Peer reviewed | en |
dc.description.version | Published Version | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.citation | Regazzoni, F., Palmieri, P., Smailbegovic, F., Cammarota, R. and Polian, I. (2021) 'Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning', CAAI Transactions on Intelligence Technology, 6(2), pp. 180-191. doi: 10.1049/cit2.12029 | en |
dc.identifier.doi | 10.1049/cit2.12029 | en |
dc.identifier.eissn | 2468-2322 | |
dc.identifier.endpage | 191 | en |
dc.identifier.issued | 2 | en |
dc.identifier.journaltitle | CAAI Transactions on Intelligence Technology | en |
dc.identifier.startpage | 180 | en |
dc.identifier.uri | https://hdl.handle.net/10468/12026 | |
dc.identifier.volume | 6 | en |
dc.language.iso | en | en |
dc.publisher | Institution of Engineering and Technology (IET) | en |
dc.relation.project | info:eu-repo/grantAgreement/EC/H2020::RIA/871738/EU/Cross-layer cognitive optimization tools & methods for the lifecycle support of dependable CPSoS/CPSoSaware | en |
dc.rights | © 2021, the Authors. CAAI Transactions on Intelligence Technology published by John Wiley & Sons Ltd on behalf of the Institution of Engineering and Technology and Chongqing University of Technology. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | en |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | en |
dc.subject | Artificial intelligence | en |
dc.subject | AI models | en |
dc.subject | Piracy | en |
dc.subject | IP protection mechanisms | en |
dc.title | Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning | en |
dc.type | Article (peer-reviewed) | en |