Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17 Privacy TechniqueModel Extraction AttackAttack Evaluation 2023.10.17 2025.05.28 Literature Database
Data-Free Model Extraction Attacks in the Context of Object Detection Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09 Dataset GenerationModel Extraction AttackAdversarial Example 2023.08.09 2025.05.28 Literature Database
DREAM: Domain-free Reverse Engineering Attributes of Black-box Model Authors: Rongqing Li, Jiaqi Yu, Changsheng Li, Wenhan Luo, Ye Yuan, Guoren Wang | Published: 2023-07-20 Out-of-Distribution DetectionModel Extraction AttackImprovement of Learning 2023.07.20 2025.05.28 Literature Database
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18 Privacy Enhancing TechnologyModel Performance EvaluationModel Extraction Attack 2023.02.16 2025.05.28 Literature Database
Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini | Published: 2022-10-07 | Updated: 2023-07-20 DNN IP Protection MethodModel Extraction AttackAdversarial Example 2022.10.07 2025.05.28 Literature Database
DeltaBound Attack: Efficient decision-based attack in low queries regime Authors: Lorenzo Rossi | Published: 2022-10-01 DNN IP Protection MethodModel Extraction AttackModel Design 2022.10.01 2025.05.28 Literature Database
Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models Authors: Sohaib Ahmad, Benjamin Fuller, Kaleel Mahmood | Published: 2022-09-22 Privacy AssessmentModel Extraction AttackFace Recognition System 2022.09.22 2025.05.28 Literature Database
Dataset Inference for Self-Supervised Models Authors: Adam Dziedzic, Haonan Duan, Muhammad Ahmad Kaleem, Nikita Dhawan, Jonas Guan, Yannis Cattan, Franziska Boenisch, Nicolas Papernot | Published: 2022-09-16 | Updated: 2023-01-13 PoisoningMembership InferenceModel Extraction Attack 2022.09.16 2025.05.28 Literature Database
SEEK: model extraction attack against hybrid secure inference protocols Authors: Si Chen, Junfeng Fan | Published: 2022-09-14 Model Extraction AttackModel DesignDeep Learning Method 2022.09.14 2025.05.28 Literature Database
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions Authors: Maria Rigaki, Sebastian Garcia | Published: 2022-04-13 | Updated: 2023-06-04 Dataset evaluationModel Extraction Attack 2022.04.13 2025.05.28 Literature Database