WeChat Mini Program
Old Version Features

Defending Against Similarity Shift Attack for EaaS Via Adaptive Multi-Target Watermarking

Zuopeng Yang, Pengyu Chen,Tao Li, Kangjun Liu, Yuan Huang,Xin Lin

Information Sciences(2024)

Cited 0|Views10
Key words
EaaS,Similarity shift,Embedding watermarking,Adaptive multi-target watermarking,Copyright protection
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined