モデル抽出攻撃

QuantumLeak: Stealing Quantum Neural Networks from Cloud-based NISQ Machines

Authors: Zhenxiao Fu, Min Yang, Cheng Chu, Yilun Xu, Gang Huang, Fan Chen | Published: 2024-03-16
ウォーターマーキング
モデル抽出攻撃
量子フレームワーク

Stealing Part of a Production Language Model

Authors: Nicholas Carlini, Daniel Paleka, Krishnamurthy Dj Dvijotham, Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski, Milad Nasr, Arthur Conmy, Itay Yona, Eric Wallace, David Rolnick, Florian Tramèr | Published: 2024-03-11 | Updated: 2024-07-09
プロンプトリーキング
モデルの堅牢性
モデル抽出攻撃

Watermark Stealing in Large Language Models

Authors: Nikola Jovanović, Robin Staab, Martin Vechev | Published: 2024-02-29 | Updated: 2024-06-24
モデル抽出攻撃
大規模言語モデル
攻撃の分類

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay | Published: 2024-02-19
モデル抽出攻撃
分類パターン分析
敵対的サンプル

Evaluating Efficacy of Model Stealing Attacks and Defenses on Quantum Neural Networks

Authors: Satwik Kundu, Debarshi Kundu, Swaroop Ghosh | Published: 2024-02-18
データセット生成
モデル抽出攻撃
防御手法

Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks

Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21
ネットワーク脅威検出
モデル抽出攻撃
性能評価手法

SAME: Sample Reconstruction against Model Extraction Attacks

Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08
ウォーターマーキング
モデル性能評価
モデル抽出攻撃

Model Extraction Attacks Revisited

Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08
サイバー攻撃
モデル抽出攻撃
敵対的攻撃

SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang | Published: 2023-10-19
メンバーシップ推論
モデル抽出攻撃
攻撃の評価

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17
プライバシー手法
モデル抽出攻撃
攻撃の評価