MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03 Model Extraction AttackDetection of Model Extraction AttacksDefense Method 2025.06.03 2025.06.05 Literature Database
Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03 Certified RobustnessDetection of Model Extraction AttacksAttack Evaluation 2019.06.26 2025.05.28 Literature Database
Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19 Backdoor DetectionDetection of Model Extraction AttacksVisual Privacy 2019.02.05 2025.05.28 Literature Database
Prior Networks for Detection of Adversarial Attacks Authors: Andrey Malinin, Mark Gales | Published: 2018-12-06 Detection of Model Extraction AttacksRobustness EvaluationAdversarial Learning 2018.12.06 2025.05.28 Literature Database
Model-Reuse Attacks on Deep Learning Systems Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.12.02 2025.05.28 Literature Database
Bridging machine learning and cryptography in defence against adversarial attacks Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05 Certified RobustnessDetection of Model Extraction AttacksRobustness Analysis 2018.09.05 2025.05.28 Literature Database
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03 Backdoor AttackDetection of Model Extraction AttacksTransparency and Verification 2018.09.03 2025.05.28 Literature Database
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14 Hyperparameter TuningModel Extraction AttackDetection of Model Extraction Attacks 2018.08.14 2025.05.28 Literature Database
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29 IoT CybersecurityModel Extraction AttackDetection of Model Extraction Attacks 2018.07.29 2025.05.28 Literature Database
Algorithms that Remember: Model Inversion Attacks and Data Protection Law Authors: Michael Veale, Reuben Binns, Lilian Edwards | Published: 2018-07-12 | Updated: 2018-10-15 Membership InferenceModel InversionDetection of Model Extraction Attacks 2018.07.12 2025.05.28 Literature Database