{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:53:50Z","timestamp":1765828430356,"version":"3.37.3"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFF0905000"],"award-info":[{"award-number":["2023YFF0905000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016807","name":"Natural Science Foundation of Shenyang Municipality","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172280","62172281","U20B2051"],"award-info":[{"award-number":["62172280","62172281","U20B2051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai Municipality","doi-asserted-by":"publisher","award":["21ZR1444600"],"award-info":[{"award-number":["21ZR1444600"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1016\/j.eswa.2024.126172","type":"journal-article","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T16:35:02Z","timestamp":1734539702000},"page":"126172","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Soft integrity authentication for neural network models"],"prefix":"10.1016","volume":"267","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9024-9840","authenticated-orcid":false,"given":"Lin","family":"Huang","sequence":"first","affiliation":[]},{"given":"Fengyong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3784-4157","authenticated-orcid":false,"given":"Heng","family":"Yao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0370-4623","authenticated-orcid":false,"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2024.126172_b1","series-title":"Proceedings of the 36th ACM\/SIGAPP symposium on applied computing","first-page":"952","article-title":"DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN","author":"Abuadbba","year":"2021"},{"key":"10.1016\/j.eswa.2024.126172_b2","unstructured":"Anh, T. N., & Tran, A. T. (2021). WaNet-Imperceptible Warping-based Backdoor Attack. In Proceedings of the 9th international conference on learning representations."},{"key":"10.1016\/j.eswa.2024.126172_b3","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.ins.2021.06.073","article-title":"NeuNAC: A novel fragile watermarking algorithm for integrity protection of neural networks","volume":"576","author":"Botta","year":"2021","journal-title":"Information Sciences"},{"issue":"6","key":"10.1016\/j.eswa.2024.126172_b4","doi-asserted-by":"crossref","first-page":"5068","DOI":"10.1109\/TITS.2020.3046646","article-title":"Interpretable end-to-end urban autonomous driving with latent deep reinforcement learning","volume":"23","author":"Chen","year":"2022","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"year":"2017","series-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","key":"10.1016\/j.eswa.2024.126172_b5"},{"key":"10.1016\/j.eswa.2024.126172_b6","series-title":"Proceedings of the 9th international conference on learning representations","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2021"},{"key":"10.1016\/j.eswa.2024.126172_b7","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.ins.2023.01.036","article-title":"Validating the integrity of convolutional neural network predictions based on zero-knowledge proof","volume":"625","author":"Fan","year":"2023","journal-title":"Information Sciences"},{"issue":"6","key":"10.1016\/j.eswa.2024.126172_b8","doi-asserted-by":"crossref","first-page":"2938","DOI":"10.1109\/TPAMI.2021.3052549","article-title":"DVG-Face: Dual variational generation for heterogeneous face recognition","volume":"44","author":"Fu","year":"2022","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.eswa.2024.126172_b9","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.patrec.2024.02.018","article-title":"Adaptive white-box watermarking with self-mutual check parameters in deep neural networks","volume":"180","author":"Gao","year":"2024","journal-title":"Pattern Recognition Letters"},{"key":"10.1016\/j.eswa.2024.126172_b10","doi-asserted-by":"crossref","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","article-title":"BadNets: Evaluating backdooring attacks on deep neural networks","volume":"7","author":"Gu","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2024.126172_b11","series-title":"Proceedings of the 28th ACM international conference on multimedia","first-page":"2273","article-title":"Reversible watermarking in deep convolutional neural networks for integrity authentication","author":"Guan","year":"2020"},{"key":"10.1016\/j.eswa.2024.126172_b12","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"4724","article-title":"Sensitive-sample fingerprinting of deep neural networks","author":"He","year":"2019"},{"key":"10.1016\/j.eswa.2024.126172_b13","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.eswa.2024.126172_b14","series-title":"2023 IEEE international workshop on information forensics and security","first-page":"1","article-title":"Recoverable active protection framework for neural network models","author":"Huang","year":"2023"},{"issue":"20","key":"10.1016\/j.eswa.2024.126172_b15","doi-asserted-by":"crossref","first-page":"24056","DOI":"10.1007\/s10489-023-04797-w","article-title":"Convolutional neural networks tamper detection and location based on fragile watermarking","volume":"53","author":"Huang","year":"2023","journal-title":"Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies"},{"key":"10.1016\/j.eswa.2024.126172_b16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2022.118990","article-title":"A defense method against backdoor attacks on neural networks","volume":"213","author":"Kaviani","year":"2023","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2024.126172_b17","series-title":"Proceedings of the neural information processing systems 25: 26th annual conference on neural information processing systems 2012","first-page":"1106","article-title":"ImageNet classification with deep convolutional neural networks","author":"Krizhevsky","year":"2012"},{"key":"10.1016\/j.eswa.2024.126172_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.knosys.2022.108238","article-title":"Verification of integrity of deployed deep learning models using Bayesian optimization","volume":"241","author":"Kuttichira","year":"2022","journal-title":"Knowledge-Based Systems"},{"key":"10.1016\/j.eswa.2024.126172_b19","series-title":"Proceedings of the thirty-sixth AAAI conference on artificial intelligence","first-page":"9595","article-title":"DeepAuth: A DNN authentication framework by model-unique and fragile signature embedding","author":"Lao","year":"2022"},{"key":"10.1016\/j.eswa.2024.126172_b20","first-page":"1","article-title":"Backdoor learning: A survey","author":"Li","year":"2022","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"10.1016\/j.eswa.2024.126172_b21","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"16443","article-title":"Invisible backdoor attack with sample-specific triggers","author":"Li","year":"2021"},{"key":"10.1016\/j.eswa.2024.126172_b22","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.neunet.2022.01.009","article-title":"Deep rival penalized competitive learning for low-resolution face recognition","volume":"148","author":"Li","year":"2022","journal-title":"Neural Networks"},{"key":"10.1016\/j.eswa.2024.126172_b23","doi-asserted-by":"crossref","first-page":"3737","DOI":"10.1109\/TIP.2022.3175403","article-title":"SceneSketcher-v2: Fine-grained scene-level sketch-based image retrieval using adaptive GCNs","volume":"31","author":"Liu","year":"2022","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.eswa.2024.126172_b24","series-title":"Proceedings of the 3rd international conference on learning representations","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2015"},{"year":"2019","series-title":"Label-consistent backdoor attacks","author":"Turner","key":"10.1016\/j.eswa.2024.126172_b25"},{"key":"10.1016\/j.eswa.2024.126172_b26","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.neunet.2023.02.001","article-title":"CLAD: a realistic continual learning benchmark for autonomous driving","volume":"161","author":"Verwimp","year":"2023","journal-title":"Neural Networks"},{"key":"10.1016\/j.eswa.2024.126172_b27","series-title":"Proceedings of the 30th ACM international conference on multimedia","first-page":"2881","article-title":"Neural network model protection with piracy identification and tampering localization capability","author":"Xiong","year":"2022"},{"issue":"6","key":"10.1016\/j.eswa.2024.126172_b28","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1109\/TAI.2021.3133824","article-title":"Intellectual property protection for deep learning models: Taxonomy, methods, attacks, and evaluations","volume":"3","author":"Xue","year":"2022","journal-title":"IEEE Transactions on Artificial Intelligence"},{"key":"10.1016\/j.eswa.2024.126172_b29","article-title":"FTG: Score-based black-box watermarking by fragile trigger generation for deep model integrity verification","author":"Yin","year":"2023","journal-title":"Journal of Information and Intelligence"},{"key":"10.1016\/j.eswa.2024.126172_b30","series-title":"Proceedings of the IEEE international conference on image processing","first-page":"3958","article-title":"Neural network fragile watermarking with no model performance degradation","author":"Yin","year":"2022"},{"key":"10.1016\/j.eswa.2024.126172_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121315","article-title":"Semi-fragile neural network watermarking for content authentication and tampering localization","volume":"236","author":"Yuan","year":"2024","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2024.126172_b32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2023.122913","article-title":"Image retrieval using unsupervised prompt learning and regional attention","volume":"247","author":"Zhang","year":"2024","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"10.1016\/j.eswa.2024.126172_b33","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/TIP.2010.2066981","article-title":"Reference sharing mechanism for watermark self-embedding","volume":"20","author":"Zhang","year":"2011","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.eswa.2024.126172_b34","series-title":"Proceedings of the Asia Pacific signal and information processing association annual summit and conference (APSIPA ASC)","first-page":"450","article-title":"Black-box lossless fragile watermarking based on hidden space search for DNN integrity authentication","author":"Zhao","year":"2023"},{"key":"10.1016\/j.eswa.2024.126172_b35","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.patrec.2022.10.013","article-title":"DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network","volume":"164","author":"Zhao","year":"2022","journal-title":"Pattern Recognition Letters"},{"key":"10.1016\/j.eswa.2024.126172_b36","series-title":"Proceedings of the thirty-first international joint conference on artificial intelligence","first-page":"1736","article-title":"Imperceptible backdoor attack: From input space to feature representation","author":"Zhong","year":"2022"},{"key":"10.1016\/j.eswa.2024.126172_b37","series-title":"Proceedings of the knowledge science, engineering and management - 14th international conference","first-page":"280","article-title":"Fragile neural network watermarking with trigger image set","volume":"vol. 12815","author":"Zhu","year":"2021"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417424030392?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417424030392?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T12:11:33Z","timestamp":1738757493000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417424030392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":37,"alternative-id":["S0957417424030392"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2024.126172","relation":{},"ISSN":["0957-4174"],"issn-type":[{"type":"print","value":"0957-4174"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Soft integrity authentication for neural network models","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2024.126172","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"126172"}}