Model Extraction Attack

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29
IoT Cybersecurity
Model Extraction Attack
Detection of Model Extraction Attacks

Model Reconstruction from Model Explanations

Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13
Query Diversity
Model Extraction Attack
Model Evaluation

Privacy-preserving Machine Learning through Data Obfuscation

Authors: Tianwei Zhang, Zecheng He, Ruby B. Lee | Published: 2018-07-05 | Updated: 2018-07-13
Privacy Enhancing Technology
Property Inference Attack
Model Extraction Attack

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models

Authors: Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes | Published: 2018-06-04 | Updated: 2018-12-14
Membership Inference
Model Extraction Attack
Watermark Evaluation

Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks

Authors: Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha | Published: 2018-05-20 | Updated: 2019-10-03
Data Preprocessing
Model Robustness
Model Extraction Attack

PRADA: Protecting against DNN Model Stealing Attacks

Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31
Data Generation
Model Extraction Attack
Threat Model

Black-box Adversarial Attacks with Limited Queries and Information

Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11
Model Extraction Attack
Adversarial Example
Adversarial Attack Methods

The Challenges in SDN/ML Based Network Security : A Survey

Authors: Tam N. Nguyen | Published: 2018-04-08 | Updated: 2018-04-14
SDN Security Solution
Model Extraction Attack
Anomaly Detection Method

A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24
Model Extraction Attack
Detection of Model Extraction Attacks
Adversarial Learning

Stealing Hyperparameters in Machine Learning

Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07
Privacy-Preserving Machine Learning
Model Extraction Attack
Optimization Strategy