Model Extraction Attack

A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24
Model Extraction Attack
Detection of Model Extraction Attacks
Adversarial Learning

Stealing Hyperparameters in Machine Learning

Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07
Privacy-Preserving Machine Learning
Model Extraction Attack
Optimization Strategy

Model Extraction Warning in MLaaS Paradigm

Authors: Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta | Published: 2017-11-20
Model Extraction Attack
Detection of Model Extraction Attacks
Information Leakage Analysis

Towards Reverse-Engineering Black-Box Neural Networks

Authors: Seong Joon Oh, Max Augustin, Bernt Schiele, Mario Fritz | Published: 2017-11-06 | Updated: 2018-02-14
Backdoor Detection
Membership Inference
Model Extraction Attack

Machine Learning Models that Remember Too Much

Authors: Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov | Published: 2017-09-22
Privacy Protection Mechanism
Privacy Leakage
Model Extraction Attack

Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward

Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20
Model Extraction Attack
Attack Detection
Machine Learning Technology

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features

Authors: Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik | Published: 2017-08-28 | Updated: 2019-05-10
Model Extraction Attack
Robustness Analysis
Adversarial Learning

Modular Learning Component Attacks: Today’s Reality, Tomorrow’s Challenge

Authors: Xinyang Zhang, Yujie Ji, Ting Wang | Published: 2017-08-25
Model Extraction Attack
Logic Locking
Attack Method

A Survey on Resilient Machine Learning

Authors: Atul Kumar, Sameep Mehta | Published: 2017-07-11
Model Inversion
Certified Robustness
Model Extraction Attack

Ensemble Adversarial Training: Attacks and Defenses

Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel | Published: 2017-05-19 | Updated: 2020-04-26
Certified Robustness
Model Extraction Attack
Deep Learning