Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting Authors: Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh | Published: 2018-11-23 | Updated: 2019-02-24 Privacy ProtectionPoisoning AttackModel Extraction Attack 2018.11.23 2025.05.28 Literature Database
Exploring Connections Between Active Learning and Model Extraction Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20 Online LearningModel Performance EvaluationModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05 IoT SecurityPoisoning AttackModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04 Model Extraction AttackAttack EvaluationDefense Method 2018.11.04 2025.05.28 Literature Database
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22 Side-Channel AttackModel Protection MethodsModel Extraction Attack 2018.10.22 2025.05.28 Literature Database
Privacy-Preserving Deep Learning via Weight Transmission Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12 Model Extraction AttackDistributed Learning PlatformDifferential Privacy 2018.09.10 2025.05.28 Literature Database
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14 Hyperparameter TuningModel Extraction AttackDetection of Model Extraction Attacks 2018.08.14 2025.05.28 Literature Database
ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30 Certified RobustnessModel Extraction AttackAdversarial attack 2018.08.05 2025.05.28 Literature Database
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06 Membership InferenceModel Extraction AttackModel Evaluation 2018.08.01 2025.05.28 Literature Database
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29 IoT CybersecurityModel Extraction AttackDetection of Model Extraction Attacks 2018.07.29 2025.05.28 Literature Database