Model Extraction Attack

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning

Authors: Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang | Published: 2019-04-01 | Updated: 2019-11-30
Model Extraction Attack
Reconstruction Attack
Adversarial Attack Detection

Adversarial Attacks on Time Series

Authors: Fazle Karim, Somshubra Majumdar, Houshang Darabi | Published: 2019-02-27 | Updated: 2019-03-01
Model Extraction Attack
Adversarial Example
Adversarial Learning

Knockoff Nets: Stealing Functionality of Black-Box Models

Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2018-12-06
Model Extraction Attack
Medical Image Analysis
Reinforcement Learning

Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning

Authors: Milad Nasr, Reza Shokri, Amir Houmansadr | Published: 2018-12-03 | Updated: 2020-06-06
Model Extraction Attack
Differential Privacy
Federated Learning

Model-Reuse Attacks on Deep Learning Systems

Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02
Model Extraction Attack
Detection of Model Extraction Attacks
Adversarial Learning

Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting

Authors: Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh | Published: 2018-11-23 | Updated: 2019-02-24
Privacy Protection
Poisoning Attack
Model Extraction Attack

Exploring Connections Between Active Learning and Model Extraction

Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20
Online Learning
Model Performance Evaluation
Model Extraction Attack

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05
IoT Security
Poisoning Attack
Model Extraction Attack

FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04
Model Extraction Attack
Attack Evaluation
Defense Method

CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22
Side-Channel Attack
Model Protection Methods
Model Extraction Attack