A framework for deep neural network multiuser authorization based on channel pruning

被引:1
作者
Wang, Linna [1 ]
Song, Yunfei [1 ]
Zhu, Yujia [1 ]
Xia, Daoxun [1 ,2 ]
Han, Guoquan [3 ]
机构
[1] Guizhou Normal Univ, Sch Big Data & Comp Sci, Guiyang, Peoples R China
[2] Guizhou Normal Univ, Engn Lab Appl Technol Big Data Educ Guizhou, Guiyang, Peoples R China
[3] CETC Big Data Res Inst Co Ltd, Natl Engn Res Ctr Big Data Applicat Improvement Go, Guiyang, Peoples R China
基金
中国国家自然科学基金;
关键词
channel pruning; copyright protection; deep neural network; multiuser authorization; WATERMARKING; IMAGE;
D O I
10.1002/cpe.7708
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Various deep neural network (DNN) model watermarks have been proposed by researchers to verify copyrights for deep neural networks DNN. However, most DNN watermarking methods cannot prevent attackers from stealing and using the model. Unlike many existing approaches, this paper uses a channel pruning algorithm to protect DNN models, which verifies DNN models copyrights but also prevents the illegal use of DNN models. In this work, the pruning threshold or pruning rate is used as the secret key of a DNN model. After the secret key is distributed to multiple users, they prune the DNN model with the secret key, and the pruned and fine-tuned model is provided to the users. The users can verify ownership of the model according to the pruning accuracy and fine-tuning accuracy. If the secret key is incorrect, the accuracy of the model after fine-tuning will be very low, and users will be unable to use the reasoning function of the fine-tuned model. Based on the CIFAR-10 and CIFAR-100 datasets, we conducted experiments on five popular DNN models. The experimental results show that we can authorize multiple users by pruning very few channels in the convolution layers of the DNN model.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Adi Y., 2018, 27 USENIX SEC S USEN
  • [2] Variational Information Distillation for Knowledge Transfer
    Ahn, Sungsoo
    Hu, Shell Xu
    Damianou, Andreas
    Lawrence, Neil D.
    Dai, Zhenwen
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 9155 - 9163
  • [3] Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
    Aiken, William
    Kim, Hyoungshick
    Woo, Simon
    Ryoo, Jungwoo
    [J]. COMPUTERS & SECURITY, 2021, 106
  • [4] Copyright protection for digital image by watermarking technique
    Ali S.A.
    Jawad M.J.
    Naser M.A.
    [J]. Ali, Suhad A. (wsci.suhad.ahmed@uobabylon.edu.iq), 1600, Korea Information Processing Society (13): : 599 - 617
  • [5] [Anonymous], 2007, Information Systems Security, V16, P93, DOI 10.1080/10658980701322528
  • [6] Banner Ron, 2018, Advances in neural information processing systems, V31
  • [7] Chmiel B., 2021, 9 INT C LEARN REPR I
  • [8] Faghri F., 2020, ADV NEUR IN
  • [9] Fan L., 2019, ARXIV
  • [10] Fan L., 2021, IEEE T PATTERN ANAL, V1, P1, DOI DOI 10.1109/TMC.2021.3110235