SOTAVerified

Model extraction

Model extraction attacks, aka model stealing attacks, are used to extract the parameters from the target model. Ideally, the adversary will be able to steal and replicate a model that will have a very similar performance to the target model.

Papers

Showing 150 of 176 papers

TitleStatusHype
Safety at Scale: A Comprehensive Survey of Large Model SafetyCode3
ATOM: A Framework of Detecting Query-Based Model Extraction Attacks for Graph Neural NetworksCode1
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction AttacksCode1
"Yes, My LoRD." Guiding Language Model Extraction with Locality Reinforced DistillationCode1
MEA-Defender: A Robust Watermark against Model Extraction AttackCode1
Watermarking Vision-Language Pre-trained Models for Multi-modal Embedding as a ServiceCode1
Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor WatermarkCode1
Protecting Language Generation Models via Invisible WatermarkingCode1
FedRolex: Model-Heterogeneous Federated Learning with Rolling Sub-Model ExtractionCode1
Black-Box Attacks on Sequential Recommenders via Data-Free Model ExtractionCode1
Model Extraction and Adversarial Transferability, Your BERT is Vulnerable!Code1
MEME: Generating RNN Model Explanations via Model ExtractionCode1
Data-Free Model ExtractionCode1
Now You See Me (CME): Concept-based Model ExtractionCode1
MEME: Generating RNN Model Explanations via Model ExtractionCode1
MARLeME: A Multi-Agent Reinforcement Learning Model Extraction LibraryCode1
Cryptanalytic Extraction of Neural Network ModelsCode1
Entangled Watermarks as a Defense against Model ExtractionCode1
Entangled Threats: A Unified Kill Chain Model for Quantum Machine Learning Security0
CEGA: A Cost-Effective Approach for Graph-Based Model Extraction and AcquisitionCode0
Navigating the Deep: Signature Extraction on Deep Neural Networks0
GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors0
Explore the vulnerability of black-box models via diffusion models0
MISLEADER: Defending against Model Extraction with Ensembles of Distilled ModelsCode0
Evaluating Query Efficiency and Accuracy of Transfer Learning-based Model Extraction Attack in Federated Learning0
On the interplay of Explainability, Privacy and Predictive Performance with Explanation-assisted Model Extraction0
Better Decisions through the Right Causal World Model0
CopyQNN: Quantum Neural Network Extraction Attack under Varying Quantum Noise0
ProDiF: Protecting Domain-Invariant Features to Secure Pre-Trained Models Against Extraction0
A Survey of Model Extraction Attacks and Defenses in Distributed Computing Environments0
Differentially private fine-tuned NF-Net to predict GI cancer type0
From Counterfactuals to Trees: Competitive Analysis of Model Extraction AttacksCode0
A Framework for Double-Blind Federated Adaptation of Foundation Models0
Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI0
"FRAME: Forward Recursive Adaptive Model Extraction -- A Technique for Advance Feature Selection"0
HoneypotNet: Backdoor Attacks Against Model Extraction0
Bounding-box Watermarking: Defense against Model Extraction Attacks on Object Detectors0
Few-shot Model Extraction Attacks against Sequential Recommender Systems0
A Hard-Label Cryptanalytic Extraction of Non-Fully Connected Deep Neural Networks using Side-Channel AttacksCode0
Your Semantic-Independent Watermark is Fragile: A Semantic Perturbation Attack against EaaS WatermarkCode0
Robust and Minimally Invasive Watermarking for EaaSCode0
Efficient Model Extraction via Boundary Sampling0
Efficient and Effective Model ExtractionCode0
CaBaGe: Data-Free Model Extraction using ClAss BAlanced Generator Ensemble0
Protecting Copyright of Medical Pre-trained Language Models: Training-Free Backdoor Model Watermarking0
VidModEx: Interpretable and Efficient Black Box Model Extraction for High-Dimensional SpacesCode0
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
QUEEN: Query Unlearning against Model Extraction0
Privacy Implications of Explainable AI in Data-Driven Systems0
Beyond Slow Signs in High-fidelity Model ExtractionCode0
Show:102550
← PrevPage 1 of 4Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1three-step-originalExact Match0.17Unverified