Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21 Network Threat DetectionModel Extraction AttackPerformance Evaluation Method 2024.01.10 2025.07.23 Literature Database
SAME: Sample Reconstruction against Model Extraction Attacks Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08 WatermarkingModel Performance EvaluationModel Extraction Attack 2023.12.17 2025.05.27 Literature Database
Model Extraction Attacks Revisited Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08 Cyber AttackModel Extraction AttackAdversarial attack 2023.12.08 2025.05.28 Literature Database
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang | Published: 2023-10-19 Membership InferenceModel Extraction AttackAttack Evaluation 2023.10.19 2025.05.28 Literature Database
Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17 Privacy TechniqueModel Extraction AttackAttack Evaluation 2023.10.17 2025.05.28 Literature Database
Data-Free Model Extraction Attacks in the Context of Object Detection Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09 Dataset GenerationModel Extraction AttackAdversarial Example 2023.08.09 2025.05.28 Literature Database
DREAM: Domain-free Reverse Engineering Attributes of Black-box Model Authors: Rongqing Li, Jiaqi Yu, Changsheng Li, Wenhan Luo, Ye Yuan, Guoren Wang | Published: 2023-07-20 Out-of-Distribution DetectionModel Extraction AttackImprovement of Learning 2023.07.20 2025.05.28 Literature Database
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18 Privacy Enhancing TechnologyModel Performance EvaluationModel Extraction Attack 2023.02.16 2025.05.28 Literature Database
Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini | Published: 2022-10-07 | Updated: 2023-07-20 DNN IP Protection MethodModel Extraction AttackAdversarial Example 2022.10.07 2025.05.28 Literature Database
DeltaBound Attack: Efficient decision-based attack in low queries regime Authors: Lorenzo Rossi | Published: 2022-10-01 DNN IP Protection MethodModel Extraction AttackModel Design 2022.10.01 2025.05.28 Literature Database