SOTAVerified

Model extraction

Model extraction attacks, aka model stealing attacks, are used to extract the parameters from the target model. Ideally, the adversary will be able to steal and replicate a model that will have a very similar performance to the target model.

Papers

Showing 126150 of 176 papers

TitleStatusHype
Interpreting Blackbox Models via Model Extraction0
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs0
Noisy Data Meets Privacy: Training Local Models with Post-Processed Remote Queries0
Learnable Linguistic Watermarks for Tracing Model Extraction Attacks on Large Language Models0
Leveraging Extracted Model Adversaries for Improved Black Box Attacks0
Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-bit Microcontrollers0
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection0
MEAOD: Model Extraction Attack against Object Detectors0
MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI0
Mercury: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator0
Mitigating Query-Flooding Parameter Duplication Attack on Regression Models with High-Dimensional Gaussian Mechanism0
Model Extraction and Adversarial Attacks on Neural Networks using Switching Power Information0
Robust and Minimally Invasive Watermarking for EaaSCode0
WARDEN: Multi-Directional Backdoor Watermarks for Embedding-as-a-Service Copyright ProtectionCode0
Process Extraction from Text: Benchmarking the State of the Art and Paving the Way for Future ChallengesCode0
Weighted Automata Extraction and Explanation of Recurrent Neural Networks for Natural Language TasksCode0
FLuID: Mitigating Stragglers in Federated Learning using Invariant DropoutCode0
Stateful Detection of Model Extraction AttacksCode0
Protecting Intellectual Property of Language Generation APIs with Lexical WatermarkCode0
From Counterfactuals to Trees: Competitive Analysis of Model Extraction AttacksCode0
Model Extraction Attacks on Graph Neural Networks: Taxonomy and RealizationCode0
ACTIVETHIEF: Model Extraction Using Active Learning and Unannotated Public DataCode0
Watermarking Counterfactual ExplanationsCode0
Model extraction from counterfactual explanationsCode0
GUIDO: A Hybrid Approach to Guideline Discovery & Ordering from Natural Language TextsCode0
Show:102550
← PrevPage 6 of 8Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1three-step-originalExact Match0.17Unverified