COGNITION: From Evaluation to Defense against Multimodal LLM CAPTCHA Solvers Authors: Junyu Wang, Changjia Zhu, Yuanbo Zhou, Lingyao Li, Xu He, Junjie Xiong | Published: 2025-12-02 Prompt leakingModel Performance EvaluationModel Extraction Attack 2025.12.02 2025.12.04 Literature Database
PVMark: Enabling Public Verifiability for LLM Watermarking Schemes Authors: Haohua Duan, Liyao Xiang, Xin Zhang | Published: 2025-10-30 Model Extraction Attack公的検証可能性Watermarking Technology 2025.10.30 2025.11.01 Literature Database
NetEcho: From Real-World Streaming Side-Channels to Full LLM Conversation Recovery Authors: Zheng Zhang, Guanlong Wu, Sen Deng, Shuai Wang, Yinqian Zhang | Published: 2025-10-29 Network Traffic AnalysisModel Extraction AttackDefense Method 2025.10.29 2025.10.31 Literature Database
Securing AI Agent Execution Authors: Christoph Bühler, Matteo Biagiola, Luca Di Grazia, Guido Salvaneschi | Published: 2025-10-24 | Updated: 2025-10-29 Indirect Prompt InjectionModel Extraction AttackDynamic Access Control 2025.10.24 2025.10.31 Literature Database
A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems Authors: Zixuan Liu, Yi Zhao, Zhuotao Liu, Qi Li, Chuanpu Fu, Guangmeng Zhou, Ke Xu | Published: 2025-10-16 Modification of Network TrafficBotnet TrafficModel Extraction Attack 2025.10.16 2025.10.18 Literature Database
Confidential LLM Inference: Performance and Cost Across CPU and GPU TEEs Authors: Marcin Chrapek, Marcin Copik, Etienne Mettaz, Torsten Hoefler | Published: 2025-09-23 Cost EfficiencyPrivacy-Preserving Machine LearningModel Extraction Attack 2025.09.23 2025.09.25 Literature Database
MER-Inspector: Assessing model extraction risks from an attack-agnostic perspective Authors: Xinwei Zhang, Haibo Hu, Qingqing Ye, Li Bai, Huadi Zheng | Published: 2025-09-23 Model Extraction AttackModel DesignRisk Assessment 2025.09.23 2025.09.25 Literature Database
Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study Authors: James C. Ward, Alex Bott, Connor York, Edmund R. Hunt | Published: 2025-09-15 Model Extraction AttackTaxonomy of Attacks脆弱性検出手法 2025.09.15 2025.09.17 Literature Database
When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08 Software SecurityModel Extraction AttackDetection of Model Extraction Attacks 2025.09.08 2025.09.10 Literature Database
An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline Authors: Tyler Shumaker, Jessica Carpenter, David Saranchak, Nathaniel D. Bastian | Published: 2025-09-04 Model InversionModel Extraction AttackRisk Analysis Method 2025.09.04 2025.09.06 Literature Database