Model Extraction Attack

FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04
Model Extraction Attack
Attack Evaluation
Defense Method

CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22
Side-Channel Attack
Model Protection Methods
Model Extraction Attack

Privacy-Preserving Deep Learning via Weight Transmission

Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12
Model Extraction Attack
Distributed Learning Platform
Differential Privacy

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures

Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14
Hyperparameter Tuning
Model Extraction Attack
Detection of Model Extraction Attacks

ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples

Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30
Certified Robustness
Model Extraction Attack
Adversarial attack

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06
Membership Inference
Model Extraction Attack
Model Evaluation

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29
IoT Cybersecurity
Model Extraction Attack
Detection of Model Extraction Attacks

Model Reconstruction from Model Explanations

Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13
Query Diversity
Model Extraction Attack
Model Evaluation

Privacy-preserving Machine Learning through Data Obfuscation

Authors: Tianwei Zhang, Zecheng He, Ruby B. Lee | Published: 2018-07-05 | Updated: 2018-07-13
Privacy Enhancing Technology
Property Inference Attack
Model Extraction Attack

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models

Authors: Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes | Published: 2018-06-04 | Updated: 2018-12-14
Membership Inference
Model Extraction Attack
Watermark Evaluation