Confidential LLM Inference: Performance and Cost Across CPU and GPU TEEs Authors: Marcin Chrapek, Marcin Copik, Etienne Mettaz, Torsten Hoefler | Published: 2025-09-23 Cost EfficiencyPrivacy-Preserving Machine LearningModel Extraction Attack 2025.09.23 2025.09.25 Literature Database
MER-Inspector: Assessing model extraction risks from an attack-agnostic perspective Authors: Xinwei Zhang, Haibo Hu, Qingqing Ye, Li Bai, Huadi Zheng | Published: 2025-09-23 Model Extraction AttackModel DesignRisk Assessment 2025.09.23 2025.09.25 Literature Database
Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study Authors: James C. Ward, Alex Bott, Connor York, Edmund R. Hunt | Published: 2025-09-15 Model Extraction AttackTaxonomy of Attacks脆弱性検出手法 2025.09.15 2025.09.17 Literature Database
When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08 Software SecurityModel Extraction AttackDetection of Model Extraction Attacks 2025.09.08 2025.09.10 Literature Database
An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline Authors: Tyler Shumaker, Jessica Carpenter, David Saranchak, Nathaniel D. Bastian | Published: 2025-09-04 Model InversionModel Extraction AttackRisk Analysis Method 2025.09.04 2025.09.06 Literature Database
PromptCOS: Towards System Prompt Copyright Auditing for LLMs via Content-level Output Similarity Authors: Yuchen Yang, Yiming Li, Hongwei Yao, Enhao Huang, Shuo Shao, Bingrun Yang, Zhibo Wang, Dacheng Tao, Zhan Qin | Published: 2025-09-03 Prompt validationPrompt leakingModel Extraction Attack 2025.09.03 2025.09.05 Literature Database
Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses Authors: Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong | Published: 2025-08-27 Model Extraction AttackAdversarial LearningIntellectual Property Protection 2025.08.27 2025.08.29 Literature Database
A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives Authors: Kaixiang Zhao, Lincan Li, Kaize Ding, Neil Zhenqiang Gong, Yue Zhao, Yushun Dong | Published: 2025-08-20 | Updated: 2025-08-27 Model Extraction AttackIntellectual Property Protection防御手法の統合 2025.08.20 2025.08.29 Literature Database
From Legacy to Standard: LLM-Assisted Transformation of Cybersecurity Playbooks into CACAO Format Authors: Mehdi Akbari Gurabi, Lasse Nitz, Radu-Mihai Castravet, Roman Matzutt, Avikarsha Mandal, Stefan Decker | Published: 2025-08-05 Security AnalysisText Generation MethodModel Extraction Attack 2025.08.05 2025.08.07 Literature Database
Distilled Large Language Model in Confidential Computing Environment for System-on-Chip Design Authors: Dong Ben, Hui Feng, Qian Wang | Published: 2025-07-22 Prompt leakingModel Extraction AttackFactors of Performance Degradation 2025.07.22 2025.07.24 Literature Database