SOTAVerified

Model extraction

Model extraction attacks, aka model stealing attacks, are used to extract the parameters from the target model. Ideally, the adversary will be able to steal and replicate a model that will have a very similar performance to the target model.

Papers

Showing 76100 of 176 papers

TitleStatusHype
Model Extraction Attacks on Split Federated Learning0
Model Extraction Attacks Revisited0
Model Extraction Warning in MLaaS Paradigm0
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack0
NASPY: Automated Extraction of Automated Machine Learning Models0
NaturalFinger: Generating Natural Fingerprint with Generative Adversarial Networks0
Navigating the Deep: Signature Extraction on Deep Neural Networks0
On the amplification of security and privacy risks by post-hoc explanations in machine learning models0
Ownership Protection of Generative Adversarial Networks0
Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems0
Power-Based Attacks on Spatial DNN Accelerators0
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices0
Privacy Implications of Explainable AI in Data-Driven Systems0
ProDiF: Protecting Domain-Invariant Features to Secure Pre-Trained Models Against Extraction0
Protecting Copyright of Medical Pre-trained Language Models: Training-Free Backdoor Model Watermarking0
Quantifying (Hyper) Parameter Leakage in Machine Learning0
QuantumLeak: Stealing Quantum Neural Networks from Cloud-based NISQ Machines0
QUEEN: Query Unlearning against Model Extraction0
Revealing Secrets From Pre-trained Models0
SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack0
Security and Privacy Challenges in Deep Learning Models0
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models0
SEEK: model extraction attack against hybrid secure inference protocols0
Sparsity-driven Digital Terrain Model Extraction0
Split HE: Fast Secure Inference Combining Split Learning and Homomorphic Encryption0
Show:102550
← PrevPage 4 of 8Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1three-step-originalExact Match0.17Unverified