Model Extraction Attack

Watermark Stealing in Large Language Models

Authors: Nikola Jovanović, Robin Staab, Martin Vechev | Published: 2024-02-29 | Updated: 2024-06-24
Model Extraction Attack
Large Language Model
Taxonomy of Attacks

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay | Published: 2024-02-19
Model Extraction Attack
Classification Pattern Analysis
Adversarial Example

Evaluating Efficacy of Model Stealing Attacks and Defenses on Quantum Neural Networks

Authors: Satwik Kundu, Debarshi Kundu, Swaroop Ghosh | Published: 2024-02-18
Dataset Generation
Model Extraction Attack
Defense Method

Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks

Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21
Network Threat Detection
Model Extraction Attack
Performance Evaluation Method

SAME: Sample Reconstruction against Model Extraction Attacks

Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08
Watermarking
Model Performance Evaluation
Model Extraction Attack

Model Extraction Attacks Revisited

Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08
Cyber Attack
Model Extraction Attack
Adversarial attack

SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang | Published: 2023-10-19
Membership Inference
Model Extraction Attack
Attack Evaluation

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17
Privacy Technique
Model Extraction Attack
Attack Evaluation

Data-Free Model Extraction Attacks in the Context of Object Detection

Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09
Dataset Generation
Model Extraction Attack
Adversarial Example

DREAM: Domain-free Reverse Engineering Attributes of Black-box Model

Authors: Rongqing Li, Jiaqi Yu, Changsheng Li, Wenhan Luo, Ye Yuan, Guoren Wang | Published: 2023-07-20
Out-of-Distribution Detection
Model Extraction Attack
Improvement of Learning