FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04 Model Extraction AttackAttack EvaluationDefense Method 2018.11.04 2025.05.13 Literature Database
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22 Side-Channel AttackModel Protection MethodsModel Extraction Attack 2018.10.22 2025.05.13 Literature Database
Privacy-Preserving Deep Learning via Weight Transmission Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12 Model Extraction AttackDistributed Learning PlatformDifferential Privacy 2018.09.10 2025.05.13 Literature Database
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14 Hyperparameter TuningModel Extraction AttackDetection of Model Extraction Attacks 2018.08.14 2025.05.13 Literature Database
ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30 Certified RobustnessModel Extraction AttackAdversarial attack 2018.08.05 2025.05.13 Literature Database
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06 Membership InferenceModel Extraction AttackModel Evaluation 2018.08.01 2025.05.13 Literature Database
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29 IoT CybersecurityModel Extraction AttackDetection of Model Extraction Attacks 2018.07.29 2025.05.13 Literature Database
Model Reconstruction from Model Explanations Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13 Query DiversityModel Extraction AttackModel Evaluation 2018.07.13 2025.05.13 Literature Database
Privacy-preserving Machine Learning through Data Obfuscation Authors: Tianwei Zhang, Zecheng He, Ruby B. Lee | Published: 2018-07-05 | Updated: 2018-07-13 Privacy Enhancing TechnologyProperty Inference AttackModel Extraction Attack 2018.07.05 2025.05.13 Literature Database
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models Authors: Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes | Published: 2018-06-04 | Updated: 2018-12-14 Membership InferenceModel Extraction AttackWatermark Evaluation 2018.06.04 2025.05.13 Literature Database