{"id":"https://openalex.org/W4385473528","doi":"https://doi.org/10.48550/arxiv.2307.15860","title":"What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network","display_name":"What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385473528","doi":"https://doi.org/10.48550/arxiv.2307.15860"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2307.15860","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/abs/2307.15860","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101581460","display_name":"Ziheng Huang","orcid":"https://orcid.org/0000-0001-6432-8329"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huang, Ziheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029509550","display_name":"Boheng Li","orcid":"https://orcid.org/0000-0002-8197-8806"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Boheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391288","display_name":"Yan Cai","orcid":"https://orcid.org/0000-0001-9285-9012"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cai, Yan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100614000","display_name":"Run Wang","orcid":"https://orcid.org/0000-0002-2842-5137"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Run","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073264981","display_name":"Shangwei Guo","orcid":"https://orcid.org/0000-0002-6443-5308"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guo, Shangwei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025551938","display_name":"Liming Fang","orcid":"https://orcid.org/0000-0002-1420-2047"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fang, Liming","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Jing","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5056155495","display_name":"Lina Wang","orcid":"https://orcid.org/0000-0001-8085-1312"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Lina","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":67},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.986,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9642,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.9473268},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.70763993},{"id":"https://openalex.org/keywords/hypersphere","display_name":"Hypersphere","score":0.65527844},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.570447},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.4301553}],"concepts":[{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.9473268},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8215413},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.70763993},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6586845},{"id":"https://openalex.org/C2776562905","wikidata":"https://www.wikidata.org/wiki/Q306610","display_name":"Hypersphere","level":2,"score":0.65527844},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6090088},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.570447},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.544935},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.44928953},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.4301553},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.38903868},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3624406},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31398892},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.101258904},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.097889036},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2307.15860","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2307.15860","pdf_url":"http://arxiv.org/pdf/2307.15860","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2307.15860","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2307.15860","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.69}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4322709305","https://openalex.org/W4308928038","https://openalex.org/W4200430540","https://openalex.org/W3217069185","https://openalex.org/W3141413246","https://openalex.org/W3049340819","https://openalex.org/W3037859390","https://openalex.org/W3009622996","https://openalex.org/W2995777218","https://openalex.org/W2808862658"],"abstract_inverted_index":{"In":[0],"recent":[1],"decades,":[2],"Generative":[3],"Adversarial":[4],"Network":[5],"(GAN)":[6],"and":[7,124,151,160],"its":[8],"variants":[9],"have":[10],"achieved":[11],"unprecedented":[12],"success":[13],"in":[14,63],"image":[15],"synthesis.":[16],"However,":[17],"well-trained":[18],"GANs":[19,74],"are":[20,162],"under":[21],"the":[22,41,45,87,97,101,109,114,137],"threat":[23],"of":[24,96,100],"illegal":[25],"steal":[26],"or":[27],"leakage.":[28],"The":[29,157],"prior":[30],"studies":[31],"on":[32,119],"remote":[33],"ownership":[34,76],"verification":[35,77],"assume":[36],"a":[37,68,105],"black-box":[38],"setting":[39],"where":[40,75],"defender":[42],"can":[43,78],"query":[44],"suspicious":[46],"model":[47],"with":[48],"specific":[49],"inputs,":[50],"which":[51],"we":[52,66,93],"identify":[53],"is":[54],"not":[55],"enough":[56],"for":[57,73],"generation":[58],"tasks.":[59],"To":[60],"this":[61,64],"end,":[62],"paper,":[65],"propose":[67],"novel":[69],"IP":[70],"protection":[71],"scheme":[72,133,141],"be":[79,144],"done":[80],"by":[81,113],"checking":[82],"outputs":[83],"only,":[84],"without":[85],"choosing":[86],"inputs":[88],"(i.e.,":[89],"box-free":[90],"setting).":[91],"Specifically,":[92],"make":[94],"use":[95],"unexploited":[98],"potential":[99],"discriminator":[102],"to":[103,134,143,146],"learn":[104],"hypersphere":[106],"that":[107],"captures":[108],"unique":[110],"distribution":[111],"learned":[112],"paired":[115],"generator.":[116],"Extensive":[117],"evaluations":[118],"two":[120],"popular":[121,147],"GAN":[122,128],"tasks":[123],"more":[125],"than":[126],"10":[127],"architectures":[129],"demonstrate":[130],"our":[131],"proposed":[132,140],"effectively":[135],"verify":[136],"ownership.":[138],"Our":[139],"shown":[142],"immune":[145],"input-based":[148],"removal":[149],"attacks":[150],"robust":[152],"against":[153],"other":[154],"existing":[155],"attacks.":[156],"source":[158],"code":[159],"models":[161],"available":[163],"at":[164],"https://github.com/AbstractTeen/gan_ownership_verification":[165]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4385473528","counts_by_year":[],"updated_date":"2025-01-03T05:14:28.367097","created_date":"2023-08-02"}