モデル抽出攻撃

Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses

Authors: Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong | Published: 2025-08-27
モデル抽出攻撃
敵対的学習
知的財産保護

A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives

Authors: Kaixiang Zhao, Lincan Li, Kaize Ding, Neil Zhenqiang Gong, Yue Zhao, Yushun Dong | Published: 2025-08-20 | Updated: 2025-08-27
モデル抽出攻撃
知的財産保護
防御手法の統合

From Legacy to Standard: LLM-Assisted Transformation of Cybersecurity Playbooks into CACAO Format

Authors: Mehdi Akbari Gurabi, Lasse Nitz, Radu-Mihai Castravet, Roman Matzutt, Avikarsha Mandal, Stefan Decker | Published: 2025-08-05
セキュリティ分析
テキスト生成手法
モデル抽出攻撃

Distilled Large Language Model in Confidential Computing Environment for System-on-Chip Design

Authors: Dong Ben, Hui Feng, Qian Wang | Published: 2025-07-22
プロンプトリーキング
モデル抽出攻撃
性能低下の要因

BarkBeetle: Stealing Decision Tree Models with Fault Injection

Authors: Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald | Published: 2025-07-09
モデル抽出攻撃
敵対的攻撃
特徴選択手法

Taming Data Challenges in ML-based Security Tasks: Lessons from Integrating Generative AI

Authors: Shravya Kanchi, Neal Mangaokar, Aravind Cheruvu, Sifat Muhammad Abdullah, Shirin Nilizadeh, Atul Prakash, Bimal Viswanath | Published: 2025-07-08
データ拡張手法
バイアス
モデル抽出攻撃

MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models

Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03
モデル抽出攻撃
モデル抽出攻撃の検知
防御手法

TrojanStego: Your Language Model Can Secretly Be A Steganographic Privacy Leaking Agent

Authors: Dominik Meier, Jan Philip Wahle, Paul Röttger, Terry Ruas, Bela Gipp | Published: 2025-05-26
プロンプトインジェクション
モデル抽出攻撃
透かし技術

Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning

Authors: Francesco Diana, André Nusser, Chuan Xu, Giovanni Neglia | Published: 2025-05-15
プロンプトリーキング
モデル抽出攻撃
探索的攻撃

THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models

Authors: Yujin Huang, Zhi Zhang, Qingchuan Zhao, Xingliang Yuan, Chunyang Chen | Published: 2025-03-31
プロンプトリーキング
モデル保護手法
モデル抽出攻撃