1 code implementation • 7 Mar 2024 • Boyang Peng, Sanqing Qu, Yong Wu, Tianpei Zou, Lianghua He, Alois Knoll, Guang Chen, Changjun Jiang
In this paper, we target a practical setting where only a well-trained source model is available and investigate how we can realize IP protection.