Model Extraction Attack

Privacy-Preserving Deep Learning via Weight Transmission

Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12
Model Extraction Attack
Distributed Learning Platform
Differential Privacy

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures

Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14
Hyperparameter Tuning
Model Extraction Attack
Detection of Model Extraction Attacks

ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples

Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30
Certified Robustness
Model Extraction Attack
Adversarial attack

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06
Membership Inference
Model Extraction Attack
Model Evaluation

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29
IoT Cybersecurity
Model Extraction Attack
Detection of Model Extraction Attacks

Model Reconstruction from Model Explanations

Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13
Query Diversity
Model Extraction Attack
Model Evaluation

Privacy-preserving Machine Learning through Data Obfuscation

Authors: Tianwei Zhang, Zecheng He, Ruby B. Lee | Published: 2018-07-05 | Updated: 2018-07-13
Privacy Enhancing Technology
Property Inference Attack
Model Extraction Attack

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models

Authors: Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes | Published: 2018-06-04 | Updated: 2018-12-14
Membership Inference
Model Extraction Attack
Watermark Evaluation

Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks

Authors: Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha | Published: 2018-05-20 | Updated: 2019-10-03
Data Preprocessing
Model Robustness
Model Extraction Attack

PRADA: Protecting against DNN Model Stealing Attacks

Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31
Data Generation
Model Extraction Attack
Threat Model