期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Game Analysis for Intellectual Property Protection(IPP) of Multinational Corporations in the Context of R&D Internationalization
1
作者 贺团涛 曾德明 《Journal of Donghua University(English Edition)》 EI CAS 2011年第1期109-114,共6页
In order to explore the impact relationship between intellectual property protection(IPP) system and technological innovation,a game model was constructed.The system of IPP is a set of game rules to protect the innova... In order to explore the impact relationship between intellectual property protection(IPP) system and technological innovation,a game model was constructed.The system of IPP is a set of game rules to protect the innovation under the background of R&D internationalization.Only when the main parties abide by the system of intellectual property,can the self-interest and collective interest of the two sides be maximized.The government must strengthen the penalties for intellectual property right(IPR) violations,reduce the cost of IPP declaration,reduce the cost of the innovator's own rights protection,and increase the cost of imitate behavior of IPR. 展开更多
关键词 R&D internationalization transnational corporations(TNCs) intellectual property protection(IPP) game1
下载PDF
Song Jian on China's Intellectual Property Protection
2
作者 Jiang Min 《China's Foreign Trade》 1995年第11期6-7,共2页
On June 29 this year, Mr. Song Jian, State Councillor and Minister of the State Scientific and Technology Commission, was elected chairman at the 1995 Annual Meeting of the Chinese Group of the Association for the Int... On June 29 this year, Mr. Song Jian, State Councillor and Minister of the State Scientific and Technology Commission, was elected chairman at the 1995 Annual Meeting of the Chinese Group of the Association for the International Protection of Industrial Property (AIPPI). A leader in China’s scientific field and world-renowned expert, Mr. Song fully recognizes the positive role played by the Chinese Group of the AIPPI in promoting the establishment and development of China’s intellectual property system, expanding relations 展开更多
关键词 Song Jian on China’s intellectual property protection
下载PDF
Intellectual property protection for deep semantic segmentation models 被引量:2
3
作者 Hongjia RUAN Huihui SONG +2 位作者 Bo LIU Yong CHENG Qingshan LIU 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第1期113-121,共9页
Deep neural networks have achieved great success in varieties of artificial intelligent fields. Since training a good deep model is often challenging and costly, such deep models are of great value and even the key co... Deep neural networks have achieved great success in varieties of artificial intelligent fields. Since training a good deep model is often challenging and costly, such deep models are of great value and even the key commercial intellectual properties. Recently, deep model intellectual property protection has drawn great attention from both academia and industry, and numerous works have been proposed. However, most of them focus on the classification task. In this paper, we present the first attempt at protecting deep semantic segmentation models from potential infringements. In details, we design a new hybrid intellectual property protection framework by combining the trigger-set based and passport based watermarking simultaneously. Within it, the trigger-set based watermarking mechanism aims to force the network output copyright watermarks for a pre-defined trigger image set, which enables black-box remote ownership verification. And the passport based watermarking mechanism is to eliminate the ambiguity attack risk of trigger-set based watermarking by adding an extra passport layer into the target model. Through extensive experiments, the proposed framework not only demonstrates its effectiveness upon existing segmentation models, but also shows strong robustness to different attack techniques. 展开更多
关键词 deep neural networks intellectual property protection trigger-set passport layer
原文传递
China Strengthens the Protection of Intellectual Property
4
作者 Xiao Yang, Ministec of Justice 《China's Foreign Trade》 1995年第1期5-6,共2页
The intellectual property protection system was formed when civilization and the commodity economy were developing to a certain extent, and was a significant landmark for mankind in respecting talents and knowledge. N... The intellectual property protection system was formed when civilization and the commodity economy were developing to a certain extent, and was a significant landmark for mankind in respecting talents and knowledge. Now it is playing an important role in promoting scientific and technical progress, cultural prosperity and economic development. Such an important system ensures the smooth performance of the socialist economy, making up one of the basic premises for 展开更多
关键词 In China Strengthens the protection of intellectual property
下载PDF
Protection of Intellectual Property for Both Sides of the Straits
5
作者 Jiang Shan 《China's Foreign Trade》 1995年第1期8-9,共2页
At the invitation of Pen-tsao Chang, Chairman of the Commercial Affairs Coordination Committee for the Two Sides of the Straits, a delegation composed of nine intellectual property experts and scholars, headed by Xie ... At the invitation of Pen-tsao Chang, Chairman of the Commercial Affairs Coordination Committee for the Two Sides of the Straits, a delegation composed of nine intellectual property experts and scholars, headed by Xie Jianqun, Vicechairman of the China Council for the Promotion of International Trade (CCPIT) and Chairman of the Economic and Trade Coordination Committee for the Two Sides of the Straits, recently paid a nineday visit to Taiwan. The visit caught the attention of Taiwan’s mass media as it was the first high-ranking economic 展开更多
关键词 In protection of intellectual property for Both Sides of the Straits
下载PDF
BEIJING'S JUDICIAL PROTECTION OF INTELLECTUAL PROPERTY
6
作者 Zhang Guangliang 《China's Foreign Trade》 1996年第4期31-32,共2页
With legislation on intellectualproperty being perfectedcontinuously,"no law to follow"inChina’s intellectual property protectionhas become a phenomenon of thepast.Legislation is the prerequisitefor law enf... With legislation on intellectualproperty being perfectedcontinuously,"no law to follow"inChina’s intellectual property protectionhas become a phenomenon of thepast.Legislation is the prerequisitefor law enforcement,whereas thelatter is the aim of the former,and aguarantee for safeguarding people’slegitimate rights and interests.Thejudicial organs at various levels inBeijing have strictly implemented theintellectual property laws,safeguarded the legitimate rights andinterests of intellectual propertyproprietors,and enhanced the judicialprotection of intellectual property. 展开更多
关键词 BEIJING’S JUDICIAL protection OF intellectual property
下载PDF
Protecting Intellectual Property Rights-Creating the Future Today
7
作者 WangJingchuan 《China's Foreign Trade》 2002年第6期54-57,共4页
The year 2001 is the first year in the new century. This year, together with efforts of the State Administration for Industry and Commerce and the National Copyright Administration, we organized a series of major publ... The year 2001 is the first year in the new century. This year, together with efforts of the State Administration for Industry and Commerce and the National Copyright Administration, we organized a series of major publicity and celebration activities 展开更多
关键词 In Protecting intellectual property Rights-Creating the Future Today
下载PDF
Guang Dong, Hong Kong and Macao Initiates Cross-Region Cooperation in Protecting Intellectual Property
8
作者 Shi Zhihong Mo Yaojiang +1 位作者 Wang Hu Hu Yuzhang 《China's Foreign Trade》 2002年第11期53-53,共1页
关键词 Guang Dong Hong Kong and Macao Initiates Cross-Region Cooperation in Protecting intellectual property
下载PDF
Federated Learning with Privacy-preserving and Model IP-right-protection 被引量:3
9
作者 Qiang Yang Anbu Huang +5 位作者 Lixin Fan Chee Seng Chan Jian Han Lim Kam Woh Ng Ding Sheng Ong Bowen Li 《Machine Intelligence Research》 EI CSCD 2023年第1期19-37,共19页
In the past decades,artificial intelligence(AI)has achieved unprecedented success,where statistical models become the central entity in AI.However,the centralized training and inference paradigm for building and using... In the past decades,artificial intelligence(AI)has achieved unprecedented success,where statistical models become the central entity in AI.However,the centralized training and inference paradigm for building and using these models is facing more and more privacy and legal challenges.To bridge the gap between data privacy and the need for data fusion,an emerging AI paradigm feder-ated learning(FL)has emerged as an approach for solving data silos and data privacy problems.Based on secure distributed AI,feder-ated learning emphasizes data security throughout the lifecycle,which includes the following steps:data preprocessing,training,evalu-ation,and deployments.FL keeps data security by using methods,such as secure multi-party computation(MPC),differential privacy,and hardware solutions,to build and use distributed multiple-party machine-learning systems and statistical models over different data sources.Besides data privacy concerns,we argue that the concept of“model”matters,when developing and deploying federated models,they are easy to expose to various kinds of risks including plagiarism,illegal copy,and misuse.To address these issues,we introduce FedIPR,a novel ownership verification scheme,by embedding watermarks into FL models to verify the ownership of FL models and protect model intellectual property rights(IPR or IP-right for short).While security is at the core of FL,there are still many articles re-ferred to distributed machine learning with no security guarantee as“federated learning”,which are not satisfied with the FL definition supposed to be.To this end,in this paper,we reiterate the concept of federated learning and propose secure federated learning(SFL),where the ultimate goal is to build trustworthy and safe AI with strong privacy-preserving and IP-right-preserving.We provide a com-prehensive overview of existing works,including threats,attacks,and defenses in each phase of SFL from the lifecycle perspective. 展开更多
关键词 Federated learning privacy-preserving machine learning security decentralized learning intellectual property protection
原文传递
International Patent Cooperation,Patent Prosecution Highway Agreements,and Export Product Quality 被引量:2
10
作者 Fan Duan Yifei Li Tenglong Zhong 《China & World Economy》 2023年第6期111-133,共23页
This paper investigates how international cooperation for patent examination using Patent Prosecution Highway(PPH)agreements has affected the quality of firms'exports.Taking the PPH agreements signed between China... This paper investigates how international cooperation for patent examination using Patent Prosecution Highway(PPH)agreements has affected the quality of firms'exports.Taking the PPH agreements signed between China and the export destinations as a quasi-natural experiment,we established a difference-in-difference-in-differences model.We found that international cooperation for patent examination caused firms to increase export quality to PPH partners in patent-intensive industries to a greater extent.This effect was more profound among PPH partners with stronger intellectual property protection,diferentiated products and core products,and agreements along with the Patent Cooperation Treaty.We also found that PPH agreements increased the number of Chinese patent applications filed in PPH partners,patent applications by PPH partners in China,and the level of innovation,all of which constitute the major channels through which export quality to PPH partners increases.Our findings demonstrate that international patent cooperation has played an important role in promoting international trade quality. 展开更多
关键词 export product quality international patent cooperation intellectual property protection patent prosecution highway
原文传递
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function 被引量:8
11
作者 Ji-Liang Zhang Qiang Wu +5 位作者 Yi-Peng Ding Yong-Qiang Lv Qiang Zhou Zhi-Hua Xia Xing-Ming Sun Xing-Wei Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第1期124-136,共13页
Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intell... Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intellectual property (IP) protection, key generation and digital rights management. Ring oscillator (RO) PUF and Arbiter PUF are the most popular PUFs, but they are not specially designed for FPGA. RO PUF incurs high resource overhead while obtaining less challenge-response pairs, and requires "hard macros" to implement on FPGAs. The arbiter PUF brings low resource overhead, but its structure has big bias when it is mapped on FPGAs. Anderson PUF can address these weaknesses of current Arbiter and RO PUFs implemented on FPGAs. However, it cannot be directly implemented on the new generation 28 nm FPGAs. In order to address these problems, this paper designs and implements a delay-based PUF that uses two LUTs in an SLICEM to implement two 16-bit shift registers of the PUF, 2-to-1 multiplexers in the carry chain to implement the multiplexers of the PUF, and any one of the 8 flip-flops to latch 1-bit PUF signatures. The proposed delay-based PUF is completely realized on 28 nm commercial FPGAs, and the experimental results show its high uniqueness, reliability and reconfigurability. Moreover, we test the impact of aging on it, and the results show that the effect of aging on the proposed PUF is insignificant, with only 6% bit-flips. Finally, the prospects of the proposed PUF in the FPGA binding and volatile key generation are discussed. 展开更多
关键词 physical unclonable function (PUF) FPGA intellectual property protection fabrication variation hardware security
原文传递
Innovative development path of ethnomedicines: a case study 被引量:2
12
作者 Zhaoyun Zhu Yali Gui +6 位作者 Li Wang Ting Wang Yang Yang Yunzhuang Niu Dehuan Fu Jingkun Wang Tao Cui 《Frontiers of Medicine》 SCIE CAS CSCD 2017年第2期297-305,共9页
Innovative development extends the vitality of ethnomedicines. Developing ethnomedicines is not only beneficial to the public but also to the related industry and transforms economic growth, driving local social and e... Innovative development extends the vitality of ethnomedicines. Developing ethnomedicines is not only beneficial to the public but also to the related industry and transforms economic growth, driving local social and economic development further. Its economic benefit can be used to optimize and promote the hardware and software of the platform, as well as support the sustainable development of ethnomedicines. Apart from research and discussion on the innovative development of ethnomedicines on the basis of theory and regulations, this series of articles also summarizes cases that are conducive to the overall understanding of the necessity and feasibility of the innovative development. In terms of industrial development, large enterprises and products, such as Yunnan Baiyao, Guizhou Miao ethnomedicines, Cheezheng Tibetan Medicine, products developed from Dengzhanhua (Erigeron breviscapus), the Gold series of Yi ethnomedicines, and products developed from Sanqi (Panax notoginseng), in China are introduced and summarized, focusing on resource superiority, sustainable innovation, standard research and development, and production, as well as intellectual property protection. 展开更多
关键词 ethnomedicine industry resource advantages continuous innovation standardized development research intellectual property protection
原文传递
A Study of Steganographic Image Security
13
作者 CHEN Ming-qi directed by YANG Yi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2001年第3期81-82,共2页
关键词 intelligence security steganographic intelligence steganographic image intellectual property protection
原文传递
Spear and Shield: Evolution of Integrated Circuit Camouflaging 被引量:1
14
作者 Xue-Yan Wang Qiang Zhou +1 位作者 Yi-Ci Cai Gang Qu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第1期42-57,共16页
Intellectual property (IP) protection is one of the hardcore problems in hardware security. Semiconductor industry still lacks effective and proactive defense to shield IPs from reverse engineering (RE) based atta... Intellectual property (IP) protection is one of the hardcore problems in hardware security. Semiconductor industry still lacks effective and proactive defense to shield IPs from reverse engineering (RE) based attacks. Integrated circuit (IC) camouflaging technique fills this gap by replacing some conventional logic gates in tile IPs with specially designed logic cells (called camouflaged gates) without changing the functions of tile IPs. The camouflaged gates can perform different logic functions while maintaining an identical look to RE attackers, thus preventing them from obtaining the layout information of the IP directly from RE tools. Since it was first proposed in 2012, circuit camouflaging has become one of the hottest research topics in hardware security focusing on two fundamental problems. How to choose the types of camouflaged gates and decide where to insert them in order to simultaneously minimize the performance overhead and optimize the RE complexity? How can an attacker de-camouflage a camouflaged circuit and complete the RE attack? In this article, we review the evolution of circuit camouflaging through this spear and shield race. First, we introduce the design methods of four different kinds of camouflaged ceils based on true/dummy contacts, static random access memory (SRAM), doping, and emerging devices, respectively. Then we elaborate four representative de-camouflaging attacks: brute force attack, IC testing based attack, satisfiability-based (SAT-based) attack, and the circuit partition based attack, and the corresponding countermeasures: clique-based camouflaging, CamoPerturb, AND-tree camouflaging, and equivalent class based camouflaging, respectively. We argue that the current research efforts should be on reducing overhead introduced by circuit camouflaging and defeating decamouflaging attacks. We point out that exploring features of emerging devices could be a promising direction. Finally, as a complement to circuit camouflaging, we conclude with a brief review of other state-of-the-art IP protection techniques. 展开更多
关键词 circuit camouflaging reverse engineering intellectual property (IP) protection hardware security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部