Detection of Model Extraction Attacks

When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing

Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08
Software Security
Model Extraction Attack
Detection of Model Extraction Attacks

MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models

Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03
Model Extraction Attack
Detection of Model Extraction Attacks
Defense Method

Instance-Level Data-Use Auditing of Visual ML Models

Authors: Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter | Published: 2025-03-28 | Updated: 2025-09-16
データ毒性
Detection of Model Extraction Attacks
Watermarking Technology

From Counterfactuals to Trees: Competitive Analysis of Model Extraction Attacks

Authors: Awa Khouna, Julien Ferry, Thibaut Vidal | Published: 2025-02-07 | Updated: 2025-07-08
Model Extraction Attack
Detection of Model Extraction Attacks
再構成アルゴリズム

Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks

Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03
Certified Robustness
Detection of Model Extraction Attacks
Attack Evaluation

Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning

Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19
Backdoor Detection
Detection of Model Extraction Attacks
Visual Privacy

Prior Networks for Detection of Adversarial Attacks

Authors: Andrey Malinin, Mark Gales | Published: 2018-12-06
Detection of Model Extraction Attacks
Robustness Evaluation
Adversarial Learning

Model-Reuse Attacks on Deep Learning Systems

Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02
Model Extraction Attack
Detection of Model Extraction Attacks
Adversarial Learning

Bridging machine learning and cryptography in defence against adversarial attacks

Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05
Certified Robustness
Detection of Model Extraction Attacks
Robustness Analysis

Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques

Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03
Backdoor Attack
Detection of Model Extraction Attacks
Transparency and Verification