Model Extraction Attack

Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks

Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21
Network Threat Detection
Model Extraction Attack
Performance Evaluation Method

SAME: Sample Reconstruction against Model Extraction Attacks

Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08
Watermarking
Model Performance Evaluation
Model Extraction Attack

Model Extraction Attacks Revisited

Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08
Cyber Attack
Model Extraction Attack
Adversarial attack

SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang | Published: 2023-10-19
Membership Inference
Model Extraction Attack
Attack Evaluation

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17
Privacy Technique
Model Extraction Attack
Attack Evaluation

Data-Free Model Extraction Attacks in the Context of Object Detection

Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09
Dataset Generation
Model Extraction Attack
Adversarial Example

DREAM: Domain-free Reverse Engineering Attributes of Black-box Model

Authors: Rongqing Li, Jiaqi Yu, Changsheng Li, Wenhan Luo, Ye Yuan, Guoren Wang | Published: 2023-07-20
Out-of-Distribution Detection
Model Extraction Attack
Improvement of Learning

Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data

Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18
Privacy Enhancing Technology
Model Performance Evaluation
Model Extraction Attack

Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems

Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini | Published: 2022-10-07 | Updated: 2023-07-20
DNN IP Protection Method
Model Extraction Attack
Adversarial Example

DeltaBound Attack: Efficient decision-based attack in low queries regime

Authors: Lorenzo Rossi | Published: 2022-10-01
DNN IP Protection Method
Model Extraction Attack
Model Design