Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations Authors: Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su | Published: 2018-05-31 | Updated: 2018-12-13 Certified RobustnessDetection of Model Extraction AttacksWatermark Evaluation 2018.05.31 2025.05.28 Literature Database
Protection against Cloning for Deep Learning Authors: Richard Kenway | Published: 2018-03-29 Detection of Model Extraction AttacksAdversarial attackRobustness of Deep Networks 2018.03.29 2025.05.28 Literature Database
A Dynamic-Adversarial Mining Approach to the Security of Machine Learning Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.03.24 2025.05.28 Literature Database
Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking Authors: Francesco Restuccia, Salvatore D'Oro, Tommaso Melodia | Published: 2018-03-13 | Updated: 2018-06-11 IoT Security ChallengesProactive DefenseDetection of Model Extraction Attacks 2018.03.13 2025.05.28 Literature Database
Model Extraction Warning in MLaaS Paradigm Authors: Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta | Published: 2017-11-20 Model Extraction AttackDetection of Model Extraction AttacksInformation Leakage Analysis 2017.11.20 2025.05.28 Literature Database
Hardening Quantum Machine Learning Against Adversaries Authors: Nathan Wiebe, Ram Shankar Siva Kumar | Published: 2017-11-17 Detection of Model Extraction AttacksApproximate CalculationQuantum Machine Learning 2017.11.17 2025.05.28 Literature Database
Attacking Machine Learning models as part of a cyber kill chain Authors: Tam N. Nguyen | Published: 2017-05-01 | Updated: 2018-04-07 Security AnalysisDetection of Model Extraction AttacksAttack Detection 2017.05.01 2025.05.28 Literature Database