A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29 IoT CybersecurityModel Extraction AttackDetection of Model Extraction Attacks 2018.07.29 2025.05.28 Literature Database
Model Reconstruction from Model Explanations Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13 Query DiversityModel Extraction AttackModel Evaluation 2018.07.13 2025.05.28 Literature Database
Privacy-preserving Machine Learning through Data Obfuscation Authors: Tianwei Zhang, Zecheng He, Ruby B. Lee | Published: 2018-07-05 | Updated: 2018-07-13 Privacy Enhancing TechnologyProperty Inference AttackModel Extraction Attack 2018.07.05 2025.05.28 Literature Database
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models Authors: Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes | Published: 2018-06-04 | Updated: 2018-12-14 Membership InferenceModel Extraction AttackWatermark Evaluation 2018.06.04 2025.05.28 Literature Database
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks Authors: Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha | Published: 2018-05-20 | Updated: 2019-10-03 Data PreprocessingModel RobustnessModel Extraction Attack 2018.05.20 2025.05.28 Literature Database
PRADA: Protecting against DNN Model Stealing Attacks Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31 Data GenerationModel Extraction AttackThreat Model 2018.05.07 2025.05.28 Literature Database
Black-box Adversarial Attacks with Limited Queries and Information Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11 Model Extraction AttackAdversarial ExampleAdversarial Attack Methods 2018.04.23 2025.05.28 Literature Database
The Challenges in SDN/ML Based Network Security : A Survey Authors: Tam N. Nguyen | Published: 2018-04-08 | Updated: 2018-04-14 SDN Security SolutionModel Extraction AttackAnomaly Detection Method 2018.04.08 2025.05.28 Literature Database
A Dynamic-Adversarial Mining Approach to the Security of Machine Learning Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24 Model Extraction AttackDetection of Model Extraction AttacksAdversarial Learning 2018.03.24 2025.05.28 Literature Database
Stealing Hyperparameters in Machine Learning Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07 Privacy-Preserving Machine LearningModel Extraction AttackOptimization Strategy 2018.02.14 2025.05.28 Literature Database