モデル抽出攻撃

BarkBeetle: Stealing Decision Tree Models with Fault Injection

Authors: Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald | Published: 2025-07-09
モデル抽出攻撃
敵対的攻撃
特徴選択手法

Taming Data Challenges in ML-based Security Tasks: Lessons from Integrating Generative AI

Authors: Shravya Kanchi, Neal Mangaokar, Aravind Cheruvu, Sifat Muhammad Abdullah, Shirin Nilizadeh, Atul Prakash, Bimal Viswanath | Published: 2025-07-08
データ拡張手法
バイアス
モデル抽出攻撃

MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models

Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03
モデル抽出攻撃
モデル抽出攻撃の検知
防御手法

TrojanStego: Your Language Model Can Secretly Be A Steganographic Privacy Leaking Agent

Authors: Dominik Meier, Jan Philip Wahle, Paul Röttger, Terry Ruas, Bela Gipp | Published: 2025-05-26
プロンプトインジェクション
モデル抽出攻撃
透かし技術

Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning

Authors: Francesco Diana, André Nusser, Chuan Xu, Giovanni Neglia | Published: 2025-05-15
プロンプトリーキング
モデル抽出攻撃
探索的攻撃

THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models

Authors: Yujin Huang, Zhi Zhang, Qingchuan Zhao, Xingliang Yuan, Chunyang Chen | Published: 2025-03-31
プロンプトリーキング
モデル保護手法
モデル抽出攻撃

Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions

Authors: Yunfei Yang, Xiaojun Chen, Yuexin Xuan, Zhendong Zhao | Published: 2025-03-23
モデル抽出攻撃
悪意のあるクライアント
防御効果分析

Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots

Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16
サイバー脅威インテリジェンス
プロンプトリーキング
モデル抽出攻撃

A hierarchical approach for assessing the vulnerability of tree-based classification models to membership inference attack

Authors: Richard J. Preen, Jim Smith | Published: 2025-02-13 | Updated: 2025-06-12
プライバシー保護手法
モデル抽出攻撃
リスク評価

From Counterfactuals to Trees: Competitive Analysis of Model Extraction Attacks

Authors: Awa Khouna, Julien Ferry, Thibaut Vidal | Published: 2025-02-07 | Updated: 2025-07-08
モデル抽出攻撃
モデル抽出攻撃の検知
再構成アルゴリズム