Causal-Guided Detoxify Backdoor Attack of Open-Weight LoRA Models Authors: Linzhi Chen, Yang Sun, Hongru Wei, Yuqi Chen | Published: 2025-12-22 Backdoor DetectionDetection of Model Extraction AttacksAdversarial Attack Assessment 2025.12.22 2025.12.24 Literature Database
A Light-Weight Large Language Model File Format for Highly-Secure Model Distribution Authors: Huifeng Zhu, Shijie Li, Qinfeng Li, Yier Jin | Published: 2025-12-04 Model DoSDetection of Model Extraction AttacksInformation Security 2025.12.04 2025.12.06 Literature Database
When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08 Software SecurityModel Extraction AttackDetection of Model Extraction Attacks 2025.09.08 2025.09.10 Literature Database
MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03 Model Extraction AttackDetection of Model Extraction AttacksDefense Method 2025.06.03 2025.06.05 Literature Database
Instance-Level Data-Use Auditing of Visual ML Models Authors: Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter | Published: 2025-03-28 | Updated: 2025-09-16 データ毒性Detection of Model Extraction AttacksWatermarking Technology 2025.03.28 2025.09.18 Literature Database
From Counterfactuals to Trees: Competitive Analysis of Model Extraction Attacks Authors: Awa Khouna, Julien Ferry, Thibaut Vidal | Published: 2025-02-07 | Updated: 2025-07-08 Model Extraction AttackDetection of Model Extraction Attacks再構成アルゴリズム 2025.02.07 2025.07.10 Literature Database
Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2019-06-26 | Updated: 2020-03-03 Certified RobustnessDetection of Model Extraction AttacksAttack Evaluation 2019.06.26 2025.05.28 Literature Database
Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19 Backdoor DetectionDetection of Model Extraction AttacksVisual Privacy 2019.02.05 2025.05.28 Literature Database
Prior Networks for Detection of Adversarial Attacks Authors: Andrey Malinin, Mark Gales | Published: 2018-12-06 Detection of Model Extraction AttacksRobustness EvaluationAdversarial Learning 2018.12.06 2025.05.28 Literature Database
Model-Reuse Attacks on Deep Learning Systems Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.12.02 2025.05.28 Literature Database