深度学习模型的可信赖和隐私友好的所有权监管框架

IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2024-12-16 DOI:10.1109/TIFS.2024.3518061
Xirong Zhuang;Lan Zhang;Chen Tang;Yaliang Li
{"title":"深度学习模型的可信赖和隐私友好的所有权监管框架","authors":"Xirong Zhuang;Lan Zhang;Chen Tang;Yaliang Li","doi":"10.1109/TIFS.2024.3518061","DOIUrl":null,"url":null,"abstract":"Well-trained deep learning (DL) models are widely recognized as valuable intellectual property (IP) and have been extensively adopted. However, concerns regarding IP infringement emerge when these models are either privately sold to end-users or publicly released online. Unauthorized activities, such as redistributing privately purchased models or exploiting restricted open-source models for commercial gain, pose a significant threat to the interests of model owners. In this paper, we introduce D\n<sc>eep</small>\nR\n<sc>eg</small>\n, a trustworthy and privacy-friendly regulatory framework designed to address IP infringement within the realm of DL models, thereby nurturing a healthier development ecosystem. D\n<sc>eep</small>\nR\n<sc>eg</small>\n enables a designated third-party regulator to extract the fingerprint of the original model within a Trusted Execution Environment, as well as to verify suspect models utilizing solely the predicted label without probability. Specifically, we leverage the uniqueness of feature extractors in DL models to craft multiple synthetic inputs for a selected real input. The real input, along with its synthetic inputs, establishes a one-to-many relationship, thereby creating a unique fingerprint for the original model. Furthermore, we propose two distinct methods for suspect detection and piracy judgment. These methods analyze the responses from the model API upon feeding the fingerprint, ensuring a high level of confidence while preventing malicious accusations. Experimental results demonstrate that D\n<sc>eep</small>\nR\n<sc>eg</small>\n achieves 100% detection accuracy for pirated models, with zero false positives for irrelevant models.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"854-870"},"PeriodicalIF":6.3000,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DeepReg: A Trustworthy and Privacy-Friendly Ownership Regulatory Framework for Deep Learning Models\",\"authors\":\"Xirong Zhuang;Lan Zhang;Chen Tang;Yaliang Li\",\"doi\":\"10.1109/TIFS.2024.3518061\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Well-trained deep learning (DL) models are widely recognized as valuable intellectual property (IP) and have been extensively adopted. However, concerns regarding IP infringement emerge when these models are either privately sold to end-users or publicly released online. Unauthorized activities, such as redistributing privately purchased models or exploiting restricted open-source models for commercial gain, pose a significant threat to the interests of model owners. In this paper, we introduce D\\n<sc>eep</small>\\nR\\n<sc>eg</small>\\n, a trustworthy and privacy-friendly regulatory framework designed to address IP infringement within the realm of DL models, thereby nurturing a healthier development ecosystem. D\\n<sc>eep</small>\\nR\\n<sc>eg</small>\\n enables a designated third-party regulator to extract the fingerprint of the original model within a Trusted Execution Environment, as well as to verify suspect models utilizing solely the predicted label without probability. Specifically, we leverage the uniqueness of feature extractors in DL models to craft multiple synthetic inputs for a selected real input. The real input, along with its synthetic inputs, establishes a one-to-many relationship, thereby creating a unique fingerprint for the original model. Furthermore, we propose two distinct methods for suspect detection and piracy judgment. These methods analyze the responses from the model API upon feeding the fingerprint, ensuring a high level of confidence while preventing malicious accusations. Experimental results demonstrate that D\\n<sc>eep</small>\\nR\\n<sc>eg</small>\\n achieves 100% detection accuracy for pirated models, with zero false positives for irrelevant models.\",\"PeriodicalId\":13492,\"journal\":{\"name\":\"IEEE Transactions on Information Forensics and Security\",\"volume\":\"20 \",\"pages\":\"854-870\"},\"PeriodicalIF\":6.3000,\"publicationDate\":\"2024-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Forensics and Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10803000/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10803000/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

训练有素的深度学习(DL)模型被广泛认为是有价值的知识产权(IP),并被广泛采用。然而,当这些模型私下出售给最终用户或在网上公开发布时,就会出现对知识产权侵权的担忧。未经授权的活动,例如重新分发私人购买的模型或利用受限制的开源模型来获取商业利益,对模型所有者的利益构成重大威胁。在本文中,我们介绍了DeepReg,这是一个值得信赖和隐私友好的监管框架,旨在解决深度学习模型领域内的知识产权侵权问题,从而培育一个更健康的发展生态系统。DeepReg使指定的第三方监管机构能够在可信执行环境中提取原始模型的指纹,并仅利用预测标签验证可疑模型,而无需概率。具体来说,我们利用深度学习模型中特征提取器的唯一性为选定的真实输入制作多个合成输入。真实输入及其合成输入建立了一对多关系,从而为原始模型创建了唯一的指纹。此外,我们提出了两种不同的嫌疑人检测和盗版判断方法。这些方法在输入指纹时分析来自模型API的响应,在确保高置信度的同时防止恶意指责。实验结果表明,DeepReg对盗版模型的检测准确率达到100%,对无关模型的误报为零。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DeepReg: A Trustworthy and Privacy-Friendly Ownership Regulatory Framework for Deep Learning Models
Well-trained deep learning (DL) models are widely recognized as valuable intellectual property (IP) and have been extensively adopted. However, concerns regarding IP infringement emerge when these models are either privately sold to end-users or publicly released online. Unauthorized activities, such as redistributing privately purchased models or exploiting restricted open-source models for commercial gain, pose a significant threat to the interests of model owners. In this paper, we introduce D eep R eg , a trustworthy and privacy-friendly regulatory framework designed to address IP infringement within the realm of DL models, thereby nurturing a healthier development ecosystem. D eep R eg enables a designated third-party regulator to extract the fingerprint of the original model within a Trusted Execution Environment, as well as to verify suspect models utilizing solely the predicted label without probability. Specifically, we leverage the uniqueness of feature extractors in DL models to craft multiple synthetic inputs for a selected real input. The real input, along with its synthetic inputs, establishes a one-to-many relationship, thereby creating a unique fingerprint for the original model. Furthermore, we propose two distinct methods for suspect detection and piracy judgment. These methods analyze the responses from the model API upon feeding the fingerprint, ensuring a high level of confidence while preventing malicious accusations. Experimental results demonstrate that D eep R eg achieves 100% detection accuracy for pirated models, with zero false positives for irrelevant models.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
SMSSE: Size-pattern Mitigation Searchable Symmetric Encryption Privacy for Free: Spy Attack in Vertical Federated Learning by Both Active and Passive Parties All Points Guided Adversarial Generator for Targeted Attack Against Deep Hashing Retrieval Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing Query Correlation Attack against Searchable Symmetric Encryption with Supporting for Conjunctive Queries
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1