Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1909.01838
Cited By
High Accuracy and High Fidelity Extraction of Neural Networks
3 September 2019
Matthew Jagielski
Nicholas Carlini
David Berthelot
Alexey Kurakin
Nicolas Papernot
MLAU
MIACV
Re-assign community
ArXiv
PDF
HTML
Papers citing
"High Accuracy and High Fidelity Extraction of Neural Networks"
50 / 81 papers shown
Title
Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
AAML
44
0
0
08 Mar 2025
Atlas: A Framework for ML Lifecycle Provenance & Transparency
Marcin Spoczynski
Marcela S. Melara
S.
64
1
0
26 Feb 2025
Examining the Threat Landscape: Foundation Models and Model Stealing
Ankita Raj
Deepankar Varma
Chetan Arora
AAML
68
1
0
25 Feb 2025
Privacy Ripple Effects from Adding or Removing Personal Information in Language Model Training
Jaydeep Borkar
Matthew Jagielski
Katherine Lee
Niloofar Mireshghallah
David A. Smith
Christopher A. Choquette-Choo
PILM
78
1
0
24 Feb 2025
A Survey of Model Extraction Attacks and Defenses in Distributed Computing Environments
Kaixiang Zhao
Lincan Li
Kaize Ding
Neil Zhenqiang Gong
Yue Zhao
Yushun Dong
AAML
47
0
0
22 Feb 2025
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Yixiao Xu
Binxing Fang
Rui Wang
Yinghai Zhou
S. Ji
Yuan Liu
Mohan Li
Zhihong Tian
MIACV
AAML
63
0
0
20 Jan 2025
GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models
Jiadong Lou
Xu Yuan
Rui Zhang
Xingliang Yuan
Neil Gong
N. Tzeng
AAML
42
1
0
19 Jan 2025
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting
Nicholas Carlini
J. Chávez-Saab
Anna Hambitzer
Francisco Rodríguez-Henríquez
Adi Shamir
AAML
27
1
0
08 Oct 2024
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
38
0
0
10 Sep 2024
ModelLock: Locking Your Model With a Spell
Yifeng Gao
Yuhua Sun
Xingjun Ma
Zuxuan Wu
Yu-Gang Jiang
VLM
40
1
0
25 May 2024
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
Kaiyi Pang
Tao Qi
Chuhan Wu
Minhao Bai
Minghu Jiang
Yongfeng Huang
AAML
WaLM
70
2
0
03 May 2024
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Wenqi Wei
Ling Liu
25
16
0
02 Feb 2024
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification
Huali Ren
Anli Yan
Xiaojun Ren
Peigen Ye
Chong-zhi Gao
Zhili Zhou
Jin Li
20
0
0
25 Dec 2023
Model Stealing Attack against Recommender System
Zhihao Zhu
Rui Fan
Chenwang Wu
Yi Yang
Defu Lian
Enhong Chen
AAML
11
2
0
18 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
57
3
0
20 Nov 2023
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection
Akshit Jindal
Vikram Goyal
Saket Anand
Chetan Arora
FedML
14
2
0
08 Nov 2023
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
Boyang Zhang
Zheng Li
Ziqing Yang
Xinlei He
Michael Backes
Mario Fritz
Yang Zhang
26
4
0
19 Oct 2023
Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Jan Dubiñski
Stanislaw Pawlak
Franziska Boenisch
Tomasz Trzciñski
Adam Dziedzic
AAML
29
3
0
12 Oct 2023
Towards Few-Call Model Stealing via Active Self-Paced Knowledge Distillation and Diffusion-Based Image Generation
Vlad Hondru
Radu Tudor Ionescu
DiffM
44
1
0
29 Sep 2023
Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems
Debopam Sanyal
Jui-Tse Hung
Manavi Agrawal
Prahlad Jasti
Shahab Nikkhoo
S. Jha
Tianhao Wang
Sibin Mohan
Alexey Tumanov
39
0
0
03 Jul 2023
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions
Abdulrahman Diaa
L. Fenaux
Thomas Humphries
Marian Dietz
Faezeh Ebrahimianghazani
...
Nils Lukas
Rasoul Akhavan Mahdavi
Simon Oya
Ehsan Amjadian
Florian Kerschbaum
18
6
0
14 Jun 2023
On the Limitations of Model Stealing with Uncertainty Quantification Models
David Pape
Sina Daubener
Thorsten Eisenhofer
Antonio Emanuele Cinà
Lea Schonherr
30
3
0
09 May 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
35
9
0
17 Apr 2023
Model Extraction Attacks on Split Federated Learning
Jingtao Li
Adnan Siraj Rakin
Xing Chen
Li Yang
Zhezhi He
Deliang Fan
C. Chakrabarti
FedML
55
5
0
13 Mar 2023
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Gorka Abad
Oguzhan Ersoy
S. Picek
A. Urbieta
AAML
21
17
0
13 Feb 2023
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Interpretable Models
Abdullah Çaglar Öksüz
Anisa Halimi
Erman Ayday
ELM
AAML
21
2
0
04 Feb 2023
A Comparative Study of Image Disguising Methods for Confidential Outsourced Learning
Sagar Sharma
Yuechun Gu
Keke Chen
25
0
0
31 Dec 2022
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
31
75
0
29 Dec 2022
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters
Raphael Joud
Pierre-Alain Moëllic
S. Pontié
J. Rigaud
AAML
MIACV
MLAU
21
13
0
10 Nov 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
R. He
AAML
MLAU
40
29
0
21 Oct 2022
Differentially Private Counterfactuals via Functional Mechanism
Fan Yang
Qizhang Feng
Kaixiong Zhou
Jiahao Chen
Xia Hu
24
8
0
04 Aug 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
38
12
0
04 Aug 2022
Careful What You Wish For: on the Extraction of Adversarially Trained Models
Kacem Khaled
Gabriela Nicolescu
F. Magalhães
MIACV
AAML
27
4
0
21 Jul 2022
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
39
106
0
16 Jun 2022
Reconstructing Training Data from Trained Neural Networks
Niv Haim
Gal Vardi
Gilad Yehudai
Ohad Shamir
Michal Irani
40
132
0
15 Jun 2022
Machine Learning for Microcontroller-Class Hardware: A Review
Swapnil Sayan Saha
S. Sandha
Mani B. Srivastava
19
117
0
29 May 2022
Learning to Reverse DNNs from AI Programs Automatically
Simin Chen
Hamed Khanpour
Cong Liu
Wei Yang
35
15
0
20 May 2022
On the Difficulty of Defending Self-Supervised Learning against Model Extraction
Adam Dziedzic
Nikita Dhawan
Muhammad Ahmad Kaleem
Jonas Guan
Nicolas Papernot
MIACV
46
22
0
16 May 2022
The MeVer DeepFake Detection Service: Lessons Learnt from Developing and Deploying in the Wild
Spyridon Baxevanakis
Giorgos Kordopatis-Zilos
Panagiotis Galopoulos
Lazaros Apostolidis
Killian Levacher
Ipek B. Schlicht
Denis Teyssou
I. Kompatsiaris
Symeon Papadopoulos
34
8
0
27 Apr 2022
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions
M. Rigaki
Sebastian Garcia
AAML
20
10
0
13 Apr 2022
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering
Yukui Luo
Shijin Duan
Gongye Cheng
Yunsi Fei
Xiaolin Xu
9
8
0
22 Mar 2022
Margin-distancing for safe model explanation
Tom Yan
Chicheng Zhang
28
3
0
23 Feb 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
31
66
0
17 Feb 2022
Hardness of Noise-Free Learning for Two-Hidden-Layer Neural Networks
Sitan Chen
Aravind Gollakota
Adam R. Klivans
Raghu Meka
21
30
0
10 Feb 2022
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
Chi Hong
Jiyue Huang
L. Chen
13
2
0
31 Jan 2022
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong
Xinlei He
Yang Zhang
8
52
0
27 Jan 2022
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges
Huaming Chen
Muhammad Ali Babar
AAML
29
21
0
12 Jan 2022
Model Stealing Attacks Against Inductive Graph Neural Networks
Yun Shen
Xinlei He
Yufei Han
Yang Zhang
16
60
0
15 Dec 2021
Defending against Model Stealing via Verifying Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yong Jiang
Shutao Xia
Xiaochun Cao
AAML
35
61
0
07 Dec 2021
Property Inference Attacks Against GANs
Junhao Zhou
Yufei Chen
Chao Shen
Yang Zhang
AAML
MIACV
28
52
0
15 Nov 2021
1
2
Next