Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks Authors: Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha | Published: 2018-05-20 | Updated: 2019-10-03 Data PreprocessingModel RobustnessModel Extraction Attack 2018.05.20 2025.05.13 Literature Database
PRADA: Protecting against DNN Model Stealing Attacks Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31 Data GenerationModel Extraction AttackThreat Model 2018.05.07 2025.05.13 Literature Database
Black-box Adversarial Attacks with Limited Queries and Information Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11 Model Extraction AttackAdversarial ExampleAdversarial Attack Methods 2018.04.23 2025.05.13 Literature Database
The Challenges in SDN/ML Based Network Security : A Survey Authors: Tam N. Nguyen | Published: 2018-04-08 | Updated: 2018-04-14 SDN Security SolutionModel Extraction AttackAnomaly Detection Method 2018.04.08 2025.05.13 Literature Database
A Dynamic-Adversarial Mining Approach to the Security of Machine Learning Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.03.24 2025.05.13 Literature Database
Stealing Hyperparameters in Machine Learning Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07 Privacy-Preserving Machine LearningModel Extraction AttackOptimization Strategy 2018.02.14 2025.05.13 Literature Database
Model Extraction Warning in MLaaS Paradigm Authors: Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta | Published: 2017-11-20 Model Extraction AttackDetection of Model Extraction AttacksInformation Leakage Analysis 2017.11.20 2025.05.13 Literature Database
Towards Reverse-Engineering Black-Box Neural Networks Authors: Seong Joon Oh, Max Augustin, Bernt Schiele, Mario Fritz | Published: 2017-11-06 | Updated: 2018-02-14 Backdoor DetectionMembership InferenceModel Extraction Attack 2017.11.06 2025.05.13 Literature Database
Machine Learning Models that Remember Too Much Authors: Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov | Published: 2017-09-22 Privacy Protection MechanismPrivacy LeakageModel Extraction Attack 2017.09.22 2025.05.13 Literature Database
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20 Model Extraction AttackAttack DetectionMachine Learning Technology 2017.09.20 2025.05.13 Literature Database