Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Onion-Hash: A Compact and Robust 3D Perceptual Hash for Asset Authentication
Computer-Aided Design (CADE), Volume 175, Issue Chttps://doi.org/10.1016/j.cad.2024.103752AbstractThe digitalization of manufacturing processes and recent trends, such as the Industrial Metaverse, are continuously increasing in adoption in various critical industries, resulting in a surging demand for 3D CAD models and their exchange. ...
Highlights- A compact geometry-based approach for creating 3D perceptual hashes.
- Evaluation of tamper resistance against various 3D mesh manipulations.
- Evaluation of rotation and scale resistance against state-of-the-art methods.
- ...
- research-articleAugust 2024
Securing IP in edge AI: neural network watermarking for multimodal models
Applied Intelligence (KLU-APIN), Volume 54, Issue 21Pages 10455–10472https://doi.org/10.1007/s10489-024-05746-xAbstractIn the realm of edge AI systems where deep learning is paramount, protecting the intellectual property (IP) of multimodal neural network models is crucial. Current watermarking solutions often bypass the intricacies of multimodal models and the ...
- research-articleJuly 2024
MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis
Computers and Security (CSEC), Volume 140, Issue Chttps://doi.org/10.1016/j.cose.2024.103810AbstractAdditive Manufacturing (AM) was originally invented to reduce the cost of the prototyping process. Over time, the technology evolved to be faster, more accurate, and affordable. These factors, in addition to the potential use of AM in parts ...
- research-articleMarch 2024
When and how to introduce upstream competition in an innovation supply chain
Computers and Industrial Engineering (CINE), Volume 186, Issue Chttps://doi.org/10.1016/j.cie.2023.109749Highlights- The secondary supplier should be introduced after innovation.
- Decision-making power consignment can alleviate the competition negative effect.
- Innovation quality-dependent wholesale price contract can warrant the supplier’s profit.
Considering an innovation supply chain with a primary supplier involvement in the new product development of a downstream manufacturer who sells to consumers, we address when and how to introduce a secondary supplier by applying order commitment ...
- research-articleNovember 2023
The software heritage license dataset (2022 edition)
Empirical Software Engineering (KLU-EMSE), Volume 28, Issue 6https://doi.org/10.1007/s10664-023-10377-wAbstractContext:When software is released publicly, it is common to include with it either the full text of the license or licenses under which it is published, or a detailed reference to them. Therefore public licenses, including FOSS (free, open source ...
-
- research-articleAugust 2023
Robust Audio Watermarking Based on Iterative Filtering
Circuits, Systems, and Signal Processing (CSSP), Volume 43, Issue 1Pages 348–367https://doi.org/10.1007/s00034-023-02475-3AbstractThe digital media shared over the Internet is the backbone of the current generation of communication. Multimedia is becoming increasingly popular with no governing body for intellectual property rights, hence the need for protecting it ...
- research-articleJanuary 2023
Impact of blockchain and distributed ledger technology for the management of the intellectual property life cycle: A multiple case study analysis
Computers in Industry (CIIN), Volume 144, Issue Chttps://doi.org/10.1016/j.compind.2022.103789AbstractThe purpose of this paper is to examine how blockchain and in general distributed ledger technology can help to solve intellectual property challenges of today´s era of digitization. We investigate business ventures leveraging ...
Highlights- Studies the impact of distributed ledger technology for the management of the intellectual property life cycle.
- research-articleDecember 2022
Impact of blockchain and distributed ledger technology for the management, protection, enforcement and monetization of intellectual property: a systematic literature review
Information Systems and e-Business Management (SPISEM), Volume 21, Issue 2Pages 229–275https://doi.org/10.1007/s10257-022-00579-yAbstractIn an increasingly global, connected, and digital world, the management, protection, enforcement and monetization of intellectual property has never been so challenging and critical at the same time. Challenging because intellectual property, ...
- research-articleNovember 2022
An improved entity recognition approach to cyber-social knowledge provision of intellectual property using a CRF-LSTM model
Pattern Recognition Letters (PTRL), Volume 163, Issue CPages 145–151https://doi.org/10.1016/j.patrec.2022.10.001Highlights- An improved deep learning model using CRF and Bi-LSTM is given to achieve named entity recognition with unbalanced labels.
- An adaptive G-Score is used to compare the fitting ability of models by evaluating the gap between Precision and ...
With the development of cutting-edge IT technologies, e.g. Big Data, Knowledge Engineering, etc., traditional Intellectual Property (IP) services have depicted high redundancy and low efficiency during management of such large-scale of data. ...
- ArticleMay 2023
Accompaniment Methodology of Open Innovation in Local Universities After COVID-19
- Hilda Angélica Del Carpio Ramos,
- Pedro Antonio Del Carpio Ramos,
- Francisco José García-Peñalvo,
- Jose Carlos Montes Ninaquispe,
- Haydeé Ysabel del Pilar Chirinos Cuadros,
- Eduardo Alberto Martín Zárate Aguinaga
Proceedings TEEM 2022: Tenth International Conference on Technological Ecosystems for Enhancing MulticulturalityPages 366–374https://doi.org/10.1007/978-981-99-0942-1_37AbstractInnovation has never been as important as it is now to solve the problems caused by COVID-19 and the socioeconomic crisis. In this context, and within the framework of an economy based on knowledge and change, economic and social agents need open ...
- research-articleMay 2022
Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
SN Computer Science (SNCS), Volume 3, Issue 4https://doi.org/10.1007/s42979-022-01194-xAbstractIntellectual Property (IP) core has evolved into a primary component of System-on-Chip (SoC). They address and implement a wide range of hardware functionalities within a chip core logic. Hence, IP reuse plays a prominent role in enhancing ...
- research-articleMay 2022
Discovering the influences of the patent innovations on the stock market
Information Processing and Management: an International Journal (IPRM), Volume 59, Issue 3https://doi.org/10.1016/j.ipm.2022.102908AbstractWith the implementation of the innovation-driven development strategy, increasing technical innovations are patented by the individuals or the companies. As a form of intellectual properties, the patent has attracted attention from ...
Highlights- The patent and market activities based stock market trend prediction model includes a discrete wavelet transform method and a long-short-term memory based ...
- ArticleFebruary 2022
Tensions Between Intellectual Property Law and Freedom of Expression: A UK Perspective
Information for a Better World: Shaping the Global FuturePages 177–184https://doi.org/10.1007/978-3-030-96957-8_16AbstractThis short paper explores the tensions inherent in intellectual property law and freedom of expression from a UK perspective. It considers the barriers IP law puts in place to creative ideas and free expression, and the impact of the changes in UK ...
- research-articleDecember 2021
Security-driven distributed platforms for intellectual property resource provision - a case study of TSITE IP
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 10, Issue 1https://doi.org/10.1186/s13677-021-00274-2AbstractIn the information age, with the vigorous development of big data and artificial intelligence, intellectual property protection is an essential part of the current scientific and technological development. Intellectual property related data grows ...
- ArticleOctober 2021
TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks
Computer Security – ESORICS 2021Pages 542–562https://doi.org/10.1007/978-3-030-88418-5_26AbstractWell-trained deep neural networks (DNN) are an indispensable part of the intellectual property of the model owner. However, the confidentiality of models are threatened by model piracy, which steals a DNN and obfuscates the pirated model with post-...
- research-articleSeptember 2021
Intellectual property protection mechanisms and the characteristics of founding teams
Scientometrics (SPSCI), Volume 126, Issue 9Pages 7329–7350https://doi.org/10.1007/s11192-021-04098-4AbstractIntellectual property protection mechanisms (IPPMs) are critical to fostering science, technology, and innovation, and their relevance has grown enormously with the increased trade in goods and services involving patentable technologies. Scholars ...
- research-articleJuly 2021
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
Computers and Security (CSEC), Volume 106, Issue Chttps://doi.org/10.1016/j.cose.2021.102277AbstractCreating a state-of-the-art deep-learning system requires vast amounts of data, expertise, and hardware, yet research into copyright protection for neural networks has been limited. One of the main methods for achieving such protection ...
- research-articleMay 2021
Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection
Information Processing and Management: an International Journal (IPRM), Volume 58, Issue 3https://doi.org/10.1016/j.ipm.2021.102507Highlights- A new consensus mechanism Proof-of-contribution was proposed for public blockchain.
- User behaviors were quantified as blockchain contribution values through an algorithm.
- The highest contribution node gets the right of bookkeeping ...
Blockchain has received a lot of attention recently for its characteristics of decentralization, immutability, traceability, etc., making it a promising technology for the development of various applications, especially the management of various ...
- ArticleNovember 2020
The Intellectual Property Risks of Integrating Public Digital Cultural Resources in China
Digital Libraries at Times of Massive Societal TransitionPages 349–354https://doi.org/10.1007/978-3-030-64452-9_32AbstractTo integrate public digital cultural resources is to cluster, integrate, and reorganize the scattered and relatively independent digital resources from libraries, museums, art galleries, cultural museums, and other public cultural institutions, to ...
- research-articleMay 2021
The Multi-Watermarks Attack of DNN Watermarking
ICAIP '20: Proceedings of the 4th International Conference on Advances in Image ProcessingPages 178–184https://doi.org/10.1145/3441250.3441279Deep learning models are widely used in business scenarios and have achieved some success. It is usually time or computing consuming to build a production-level deep learning model. As a result, such models require copyright protection by watermarks. So ...