Model Extraction Attack

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17
Privacy Technique
Model Extraction Attack
Attack Evaluation

Data-Free Model Extraction Attacks in the Context of Object Detection

Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09
Dataset Generation
Model Extraction Attack
Adversarial Example

DREAM: Domain-free Reverse Engineering Attributes of Black-box Model

Authors: Rongqing Li, Jiaqi Yu, Changsheng Li, Wenhan Luo, Ye Yuan, Guoren Wang | Published: 2023-07-20
Out-of-Distribution Detection
Model Extraction Attack
Improvement of Learning

Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data

Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18
Privacy Enhancing Technology
Model Performance Evaluation
Model Extraction Attack

Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems

Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini | Published: 2022-10-07 | Updated: 2023-07-20
DNN IP Protection Method
Model Extraction Attack
Adversarial Example

DeltaBound Attack: Efficient decision-based attack in low queries regime

Authors: Lorenzo Rossi | Published: 2022-10-01
DNN IP Protection Method
Model Extraction Attack
Model Design

Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models

Authors: Sohaib Ahmad, Benjamin Fuller, Kaleel Mahmood | Published: 2022-09-22
Privacy Assessment
Model Extraction Attack
Face Recognition System

Dataset Inference for Self-Supervised Models

Authors: Adam Dziedzic, Haonan Duan, Muhammad Ahmad Kaleem, Nikita Dhawan, Jonas Guan, Yannis Cattan, Franziska Boenisch, Nicolas Papernot | Published: 2022-09-16 | Updated: 2023-01-13
Poisoning
Membership Inference
Model Extraction Attack

SEEK: model extraction attack against hybrid secure inference protocols

Authors: Si Chen, Junfeng Fan | Published: 2022-09-14
Model Extraction Attack
Model Design
Deep Learning Method

Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions

Authors: Maria Rigaki, Sebastian Garcia | Published: 2022-04-13 | Updated: 2023-06-04
Dataset evaluation
Model Extraction Attack