A Dynamic-Adversarial Mining Approach to the Security of Machine Learning Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.03.24 2025.05.28 Literature Database
Stealing Hyperparameters in Machine Learning Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07 Privacy-Preserving Machine LearningModel Extraction AttackOptimization Strategy 2018.02.14 2025.05.28 Literature Database
Model Extraction Warning in MLaaS Paradigm Authors: Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta | Published: 2017-11-20 Model Extraction AttackDetection of Model Extraction AttacksInformation Leakage Analysis 2017.11.20 2025.05.28 Literature Database
Towards Reverse-Engineering Black-Box Neural Networks Authors: Seong Joon Oh, Max Augustin, Bernt Schiele, Mario Fritz | Published: 2017-11-06 | Updated: 2018-02-14 Backdoor DetectionMembership InferenceModel Extraction Attack 2017.11.06 2025.05.28 Literature Database
Machine Learning Models that Remember Too Much Authors: Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov | Published: 2017-09-22 Privacy Protection MechanismPrivacy LeakageModel Extraction Attack 2017.09.22 2025.05.28 Literature Database
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20 Model Extraction AttackAttack DetectionMachine Learning Technology 2017.09.20 2025.05.28 Literature Database
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features Authors: Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik | Published: 2017-08-28 | Updated: 2019-05-10 Model Extraction AttackRobustness AnalysisAdversarial Learning 2017.08.28 2025.05.28 Literature Database
Modular Learning Component Attacks: Today’s Reality, Tomorrow’s Challenge Authors: Xinyang Zhang, Yujie Ji, Ting Wang | Published: 2017-08-25 Model Extraction AttackLogic LockingAttack Method 2017.08.25 2025.05.28 Literature Database
A Survey on Resilient Machine Learning Authors: Atul Kumar, Sameep Mehta | Published: 2017-07-11 Model InversionCertified RobustnessModel Extraction Attack 2017.07.11 2025.05.28 Literature Database
Ensemble Adversarial Training: Attacks and Defenses Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel | Published: 2017-05-19 | Updated: 2020-04-26 Certified RobustnessModel Extraction AttackDeep Learning 2017.05.19 2025.05.28 Literature Database