Watermark Stealing in Large Language Models Authors: Nikola Jovanović, Robin Staab, Martin Vechev | Published: 2024-02-29 | Updated: 2024-06-24 Model Extraction AttackLarge Language ModelTaxonomy of Attacks 2024.02.29 2025.05.27 Literature Database
Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay | Published: 2024-02-19 Model Extraction AttackClassification Pattern AnalysisAdversarial Example 2024.02.19 2025.05.27 Literature Database
Evaluating Efficacy of Model Stealing Attacks and Defenses on Quantum Neural Networks Authors: Satwik Kundu, Debarshi Kundu, Swaroop Ghosh | Published: 2024-02-18 Dataset GenerationModel Extraction AttackDefense Method 2024.02.18 2025.05.27 Literature Database
Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21 Network Threat DetectionModel Extraction AttackPerformance Evaluation Method 2024.01.10 2025.07.23 Literature Database
SAME: Sample Reconstruction against Model Extraction Attacks Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08 WatermarkingModel Performance EvaluationModel Extraction Attack 2023.12.17 2025.05.27 Literature Database
Model Extraction Attacks Revisited Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08 Cyber AttackModel Extraction AttackAdversarial attack 2023.12.08 2025.05.28 Literature Database
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang | Published: 2023-10-19 Membership InferenceModel Extraction AttackAttack Evaluation 2023.10.19 2025.05.28 Literature Database
Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17 Privacy TechniqueModel Extraction AttackAttack Evaluation 2023.10.17 2025.05.28 Literature Database
Data-Free Model Extraction Attacks in the Context of Object Detection Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09 Dataset GenerationModel Extraction AttackAdversarial Example 2023.08.09 2025.05.28 Literature Database
DREAM: Domain-free Reverse Engineering Attributes of Black-box Model Authors: Rongqing Li, Jiaqi Yu, Changsheng Li, Wenhan Luo, Ye Yuan, Guoren Wang | Published: 2023-07-20 Out-of-Distribution DetectionModel Extraction AttackImprovement of Learning 2023.07.20 2025.05.28 Literature Database