Digital watermarking for deep neural networks
暂无分享,去创建一个
Shin'ichi Satoh | Yusuke Uchida | Shigeyuki Sakazawa | Yuki Nagai | S. Satoh | Yusuke Uchida | S. Sakazawa | Yuki Nagai
[1] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System , 2002, ISMIR.
[2] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[3] Olivier Buisson,et al. Content-based video copy detection in large databases: a local fingerprints statistical similarity search approach , 2005, IEEE International Conference on Image Processing 2005.
[4] Razvan Pascanu,et al. Theano: A CPU and GPU Math Compiler in Python , 2010, SciPy.
[5] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[6] Yoshua Bengio,et al. Why Does Unsupervised Pre-training Help Deep Learning? , 2010, AISTATS.
[7] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[8] David Stutz,et al. Neural Codes for Image Retrieval , 2015 .
[9] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[10] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Pietro Perona,et al. Learning Generative Visual Models from Few Training Examples: An Incremental Bayesian Approach Tested on 101 Object Categories , 2004, 2004 Conference on Computer Vision and Pattern Recognition Workshop.
[12] Guoqiang Peter Zhang,et al. Time series forecasting using a hybrid ARIMA and neural network model , 2003, Neurocomputing.
[13] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[14] Erwan Le Merrer,et al. Adversarial frontier stitching for remote neural network watermarking , 2017, Neural Computing and Applications.
[15] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[16] Chong-Wah Ngo,et al. Deep Multimodal Learning for Affective Analysis and Retrieval , 2015, IEEE Transactions on Multimedia.
[17] Geoffrey E. Hinton,et al. On the importance of initialization and momentum in deep learning , 2013, ICML.
[18] Shin'ichi Satoh,et al. Embedding Watermarks into Deep Neural Networks , 2017, ICMR.
[19] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[20] Benjamin Schrauwen,et al. Deep content-based music recommendation , 2013, NIPS.
[21] Rich Caruana,et al. Do Deep Nets Really Need to be Deep? , 2013, NIPS.
[22] Kenta Oono,et al. Chainer : a Next-Generation Open Source Framework for Deep Learning , 2015 .
[23] Yann LeCun,et al. The Loss Surfaces of Multilayer Networks , 2014, AISTATS.
[24] Lukás Burget,et al. Recurrent neural network based language model , 2010, INTERSPEECH.
[25] Anders Krogh,et al. A Simple Weight Decay Can Improve Generalization , 1991, NIPS.
[26] Razvan Pascanu,et al. Overcoming catastrophic forgetting in neural networks , 2016, Proceedings of the National Academy of Sciences.
[27] Antonio Garzon,et al. MASK: Robust Local Features for Audio Fingerprinting , 2012, 2012 IEEE International Conference on Multimedia and Expo.
[28] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[29] Ton Kalker,et al. Chapter 12 – Steganography , 2008 .
[30] Ji Wan,et al. Deep Learning for Content-Based Image Retrieval: A Comprehensive Study , 2014, ACM Multimedia.
[31] Clément Farabet,et al. Torch7: A Matlab-like Environment for Machine Learning , 2011, NIPS 2011.
[32] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[33] Wen Gao,et al. Neural network based steganalysis in still images , 2003, ICME.
[34] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[35] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[36] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[37] Y. Nesterov. A method for solving the convex programming problem with convergence rate O(1/k^2) , 1983 .
[38] Surya Ganguli,et al. Identifying and attacking the saddle point problem in high-dimensional non-convex optimization , 2014, NIPS.
[39] Shun-ichi Amari,et al. A Theory of Adaptive Pattern Classifiers , 1967, IEEE Trans. Electron. Comput..
[40] John Barr,et al. Using digital watermarks with image signatures to mitigate the threat of the copy attack , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[41] Changhu Wang,et al. Network Morphism , 2016, ICML.
[42] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[43] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[44] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[45] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[46] Nikos Komodakis,et al. Wide Residual Networks , 2016, BMVC.
[47] Song Han,et al. EIE: Efficient Inference Engine on Compressed Deep Neural Network , 2016, 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).
[48] Byoung-Tak Zhang,et al. Overcoming Catastrophic Forgetting by Incremental Moment Matching , 2017, NIPS.
[49] Fei-Fei Li,et al. Large-Scale Video Classification with Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[50] Tianqi Chen,et al. Net2Net: Accelerating Learning via Knowledge Transfer , 2015, ICLR.
[51] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[52] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[53] Song Han,et al. Learning both Weights and Connections for Efficient Neural Network , 2015, NIPS.
[54] Yusuke Uchida,et al. Accurate content-based video copy detection with efficient feature indexing , 2011, ICMR.
[55] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.