SOTAVerified

Model extraction

Model extraction attacks, aka model stealing attacks, are used to extract the parameters from the target model. Ideally, the adversary will be able to steal and replicate a model that will have a very similar performance to the target model.

Papers

Showing 5175 of 176 papers

TitleStatusHype
Knowledge Distillation-Based Model Extraction Attack using GAN-based Private Counterfactual ExplanationsCode0
From Counterfactuals to Trees: Competitive Analysis of Model Extraction AttacksCode0
Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public DataCode0
Model Reconstruction Using Counterfactual Explanations: A Perspective From Polytope TheoryCode0
Model Extraction Attacks on Graph Neural Networks: Taxonomy and RealizationCode0
Protecting Intellectual Property of Language Generation APIs with Lexical WatermarkCode0
Towards Automatically Extracting UML Class Diagrams from Natural Language SpecificationsCode0
Evaluating Query Efficiency and Accuracy of Transfer Learning-based Model Extraction Attack in Federated Learning0
Entangled Threats: A Unified Kill Chain Model for Quantum Machine Learning Security0
Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs0
An anatomy-based V1 model: Extraction of Low-level Features, Reduction of distortion and a V1-inspired SOM0
Enhancing TinyML Security: Study of Adversarial Attack Transferability0
Emerging AI Security Threats for Autonomous Cars -- Case Studies0
Beyond Labeling Oracles: What does it mean to steal ML models?0
Efficient Model Extraction via Boundary Sampling0
Efficiently Learning One Hidden Layer ReLU Networks From Queries0
Better Decisions through the Right Causal World Model0
Adversarial Exploitation of Policy Imitation0
Efficiently Learning Any One Hidden Layer ReLU Network From Queries0
Automating Agential Reasoning: Proof-Calculi and Syntactic Decidability for STIT Logics0
DynaMarks: Defending Against Deep Learning Model Extraction Using Dynamic Watermarking0
DualCF: Efficient Model Extraction Attack from Counterfactual Explanations0
Automated Data-Driven Model Extraction and Validation of Inverter Dynamics with Grid Support Function0
Don't encrypt the data; just approximate the model \ Towards Secure Transaction and Fair Pricing of Training Data0
Differentially private fine-tuned NF-Net to predict GI cancer type0
Show:102550
← PrevPage 3 of 8Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1three-step-originalExact Match0.17Unverified