[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/journals/iet-cdt/XueSHGZWL23>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Can_He>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Dujuan_Gu>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Jian_Wang>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Mingfu_Xue>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Shichang_Sun>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Weiqiang_Liu_0001>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Yushu_Zhang>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1049%2Fcdt2.12056>
foaf:homepage <https://doi.org/10.1049/cdt2.12056>
dc:identifier DBLP journals/iet-cdt/XueSHGZWL23 (xsd:string)
dc:identifier DOI doi.org%2F10.1049%2Fcdt2.12056 (xsd:string)
dcterms:issued 2023 (xsd:gYear)
swrc:journal <https://dblp.l3s.de/d2r/resource/journals/iet-cdt>
rdfs:label ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Can_He>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Dujuan_Gu>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Jian_Wang>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Mingfu_Xue>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Shichang_Sun>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Weiqiang_Liu_0001>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Yushu_Zhang>
swrc:month May-July (xsd:string)
swrc:number 3-4 (xsd:string)
swrc:pages 111-126 (xsd:string)
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/journals/iet-cdt/XueSHGZWL23/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/journals/iet-cdt/XueSHGZWL23>
rdfs:seeAlso <http://dblp.uni-trier.de/db/journals/iet-cdt/iet-cdt17.html#XueSHGZWL23>
rdfs:seeAlso <https://doi.org/10.1049/cdt2.12056>
dc:title ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:Article
rdf:type foaf:Document
swrc:volume 17 (xsd:string)