Detection of Model Extraction Attacks

MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models

Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03
Model Extraction Attack
Detection of Model Extraction Attacks
Defense Method

Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks

Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03
Certified Robustness
Detection of Model Extraction Attacks
Attack Evaluation

Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning

Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19
Backdoor Detection
Detection of Model Extraction Attacks
Visual Privacy

Prior Networks for Detection of Adversarial Attacks

Authors: Andrey Malinin, Mark Gales | Published: 2018-12-06
Detection of Model Extraction Attacks
Robustness Evaluation
Adversarial Learning

Model-Reuse Attacks on Deep Learning Systems

Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02
Model Extraction Attack
Detection of Model Extraction Attacks
Adversarial Learning

Bridging machine learning and cryptography in defence against adversarial attacks

Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05
Certified Robustness
Detection of Model Extraction Attacks
Robustness Analysis

Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques

Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03
Backdoor Attack
Detection of Model Extraction Attacks
Transparency and Verification

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures

Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14
Hyperparameter Tuning
Model Extraction Attack
Detection of Model Extraction Attacks

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29
IoT Cybersecurity
Model Extraction Attack
Detection of Model Extraction Attacks

Algorithms that Remember: Model Inversion Attacks and Data Protection Law

Authors: Michael Veale, Reuben Binns, Lilian Edwards | Published: 2018-07-12 | Updated: 2018-10-15
Membership Inference
Model Inversion
Detection of Model Extraction Attacks