Model Extraction Attack

SEEK: model extraction attack against hybrid secure inference protocols

Authors: Si Chen, Junfeng Fan | Published: 2022-09-14
Model Extraction Attack
Model Design
Deep Learning Method

Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions

Authors: Maria Rigaki, Sebastian Garcia | Published: 2022-04-13 | Updated: 2023-06-04
Dataset evaluation
Model Extraction Attack

Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs

Authors: Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari | Published: 2021-08-29 | Updated: 2022-09-04
Model Extraction Attack
Machine Learning Method
Defense Mechanism

Stateful Detection of Model Extraction Attacks

Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12
Dataset Generation
Data Extraction and Analysis
Model Extraction Attack

A Review of Confidentiality Threats Against Embedded Neural Network Models

Authors: Raphaël Joud, Pierre-Alain Moellic, Rémi Bernhard, Jean-Baptiste Rigaud | Published: 2021-05-04
Active Learning
Data Privacy Assessment
Model Extraction Attack

Model extraction from counterfactual explanations

Authors: Ulrich Aïvodji, Alexandre Bolot, Sébastien Gambs | Published: 2020-09-03
Model Extraction Attack
Causal Interpretation
Adversarial attack

High Accuracy and High Fidelity Extraction of Neural Networks

Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot | Published: 2019-09-03 | Updated: 2020-03-03
Model Extraction Attack
Model Evaluation
Adversarial Example

The advantages of multiple classes for reducing overfitting from test set reuse

Authors: Vitaly Feldman, Roy Frostig, Moritz Hardt | Published: 2019-05-24
Model Extraction Attack
Impact of Generalization
Performance Evaluation Metrics

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning

Authors: Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang | Published: 2019-04-01 | Updated: 2019-11-30
Model Extraction Attack
Reconstruction Attack
Adversarial Attack Detection

Adversarial Attacks on Time Series

Authors: Fazle Karim, Somshubra Majumdar, Houshang Darabi | Published: 2019-02-27 | Updated: 2019-03-01
Model Extraction Attack
Adversarial Example
Adversarial Learning