Model-Reuse Attacks on Deep Learning Systems Authors: Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2018-12-02 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.12.02 2025.05.28 Literature Database
Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting Authors: Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh | Published: 2018-11-23 | Updated: 2019-02-24 Privacy ProtectionPoisoning AttackModel Extraction Attack 2018.11.23 2025.05.28 Literature Database
Exploring Connections Between Active Learning and Model Extraction Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20 Online LearningModel Performance EvaluationModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05 IoT SecurityPoisoning AttackModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04 Model Extraction AttackAttack EvaluationDefense Method 2018.11.04 2025.05.28 Literature Database
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22 Side-Channel AttackModel Protection MethodsModel Extraction Attack 2018.10.22 2025.05.28 Literature Database
Privacy-Preserving Deep Learning via Weight Transmission Authors: Le Trieu Phong, Tran Thi Phuong | Published: 2018-09-10 | Updated: 2019-02-12 Model Extraction AttackDistributed Learning PlatformDifferential Privacy 2018.09.10 2025.05.28 Literature Database
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14 Hyperparameter TuningModel Extraction AttackDetection of Model Extraction Attacks 2018.08.14 2025.05.28 Literature Database
ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30 Certified RobustnessModel Extraction AttackAdversarial attack 2018.08.05 2025.05.28 Literature Database
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06 Membership InferenceModel Extraction AttackModel Evaluation 2018.08.01 2025.05.28 Literature Database