When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08 Software SecurityModel Extraction AttackDetection of Model Extraction Attacks 2025.09.08 2025.09.10 Literature Database
MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03 Model Extraction AttackDetection of Model Extraction AttacksDefense Method 2025.06.03 2025.06.05 Literature Database
Instance-Level Data-Use Auditing of Visual ML Models Authors: Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter | Published: 2025-03-28 | Updated: 2025-09-16 データ毒性Detection of Model Extraction AttacksWatermarking Technology 2025.03.28 2025.09.18 Literature Database
From Counterfactuals to Trees: Competitive Analysis of Model Extraction Attacks Authors: Awa Khouna, Julien Ferry, Thibaut Vidal | Published: 2025-02-07 | Updated: 2025-07-08 Model Extraction AttackDetection of Model Extraction Attacks再構成アルゴリズム 2025.02.07 2025.07.10 Literature Database
Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03 Certified RobustnessDetection of Model Extraction AttacksAttack Evaluation 2019.06.26 2025.05.28 Literature Database
Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19 Backdoor DetectionDetection of Model Extraction AttacksVisual Privacy 2019.02.05 2025.05.28 Literature Database
Prior Networks for Detection of Adversarial Attacks Authors: Andrey Malinin, Mark Gales | Published: 2018-12-06 Detection of Model Extraction AttacksRobustness EvaluationAdversarial Learning 2018.12.06 2025.05.28 Literature Database
Model-Reuse Attacks on Deep Learning Systems Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.12.02 2025.05.28 Literature Database
Bridging machine learning and cryptography in defence against adversarial attacks Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05 Certified RobustnessDetection of Model Extraction AttacksRobustness Analysis 2018.09.05 2025.05.28 Literature Database
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03 Backdoor AttackDetection of Model Extraction AttacksTransparency and Verification 2018.09.03 2025.05.28 Literature Database