Model Extraction Attack

Model-Reuse Attacks on Deep Learning Systems

Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02
Model Extraction Attack
Detection of Model Extraction Attacks
Adversarial Learning

Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting

Authors: Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh | Published: 2018-11-23 | Updated: 2019-02-24
Privacy Protection
Poisoning Attack
Model Extraction Attack

Exploring Connections Between Active Learning and Model Extraction

Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20
Online Learning
Model Performance Evaluation
Model Extraction Attack

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05
IoT Security
Poisoning Attack
Model Extraction Attack

FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04
Model Extraction Attack
Attack Evaluation
Defense Method

CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22
Side-Channel Attack
Model Protection Methods
Model Extraction Attack

Privacy-Preserving Deep Learning via Weight Transmission

Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12
Model Extraction Attack
Distributed Learning Platform
Differential Privacy

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures

Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14
Hyperparameter Tuning
Model Extraction Attack
Detection of Model Extraction Attacks

ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples

Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30
Certified Robustness
Model Extraction Attack
Adversarial attack

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06
Membership Inference
Model Extraction Attack
Model Evaluation