ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.01838
  4. Cited By
High Accuracy and High Fidelity Extraction of Neural Networks

High Accuracy and High Fidelity Extraction of Neural Networks

3 September 2019
Matthew Jagielski
Nicholas Carlini
David Berthelot
Alexey Kurakin
Nicolas Papernot
    MLAU
    MIACV
ArXivPDFHTML

Papers citing "High Accuracy and High Fidelity Extraction of Neural Networks"

50 / 81 papers shown
Title
Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
AAML
44
0
0
08 Mar 2025
Atlas: A Framework for ML Lifecycle Provenance & Transparency
Atlas: A Framework for ML Lifecycle Provenance & Transparency
Marcin Spoczynski
Marcela S. Melara
S.
64
1
0
26 Feb 2025
Examining the Threat Landscape: Foundation Models and Model Stealing
Examining the Threat Landscape: Foundation Models and Model Stealing
Ankita Raj
Deepankar Varma
Chetan Arora
AAML
68
1
0
25 Feb 2025
Privacy Ripple Effects from Adding or Removing Personal Information in Language Model Training
Privacy Ripple Effects from Adding or Removing Personal Information in Language Model Training
Jaydeep Borkar
Matthew Jagielski
Katherine Lee
Niloofar Mireshghallah
David A. Smith
Christopher A. Choquette-Choo
PILM
78
1
0
24 Feb 2025
A Survey of Model Extraction Attacks and Defenses in Distributed Computing Environments
A Survey of Model Extraction Attacks and Defenses in Distributed Computing Environments
Kaixiang Zhao
Lincan Li
Kaize Ding
Neil Zhenqiang Gong
Yue Zhao
Yushun Dong
AAML
47
0
0
22 Feb 2025
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks
Yixiao Xu
Binxing Fang
Rui Wang
Yinghai Zhou
S. Ji
Yuan Liu
Mohan Li
Zhihong Tian
MIACV
AAML
63
0
0
20 Jan 2025
GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models
GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models
Jiadong Lou
Xu Yuan
Rui Zhang
Xingliang Yuan
Neil Gong
N. Tzeng
AAML
42
1
0
19 Jan 2025
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the
  Hard-Label Setting
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting
Nicholas Carlini
J. Chávez-Saab
Anna Hambitzer
Francisco Rodríguez-Henríquez
Adi Shamir
AAML
27
1
0
08 Oct 2024
On the Weaknesses of Backdoor-based Model Watermarking: An
  Information-theoretic Perspective
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective
Aoting Hu
Yanzhi Chen
Renjie Xie
Adrian Weller
38
0
0
10 Sep 2024
ModelLock: Locking Your Model With a Spell
ModelLock: Locking Your Model With a Spell
Yifeng Gao
Yuhua Sun
Xingjun Ma
Zuxuan Wu
Yu-Gang Jiang
VLM
40
1
0
25 May 2024
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
Kaiyi Pang
Tao Qi
Chuhan Wu
Minhao Bai
Minghu Jiang
Yongfeng Huang
AAML
WaLM
70
2
0
03 May 2024
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance
Wenqi Wei
Ling Liu
25
16
0
02 Feb 2024
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network
  Ownership Verification
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification
Huali Ren
Anli Yan
Xiaojun Ren
Peigen Ye
Chong-zhi Gao
Zhili Zhou
Jin Li
20
0
0
25 Dec 2023
Model Stealing Attack against Recommender System
Model Stealing Attack against Recommender System
Zhihao Zhu
Rui Fan
Chenwang Wu
Yi Yang
Defu Lian
Enhong Chen
AAML
11
2
0
18 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
57
3
0
20 Nov 2023
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based
  sample selection
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection
Akshit Jindal
Vikram Goyal
Saket Anand
Chetan Arora
FedML
14
2
0
08 Nov 2023
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
Boyang Zhang
Zheng Li
Ziqing Yang
Xinlei He
Michael Backes
Mario Fritz
Yang Zhang
26
4
0
19 Oct 2023
Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Bucks for Buckets (B4B): Active Defenses Against Stealing Encoders
Jan Dubiñski
Stanislaw Pawlak
Franziska Boenisch
Tomasz Trzciñski
Adam Dziedzic
AAML
29
3
0
12 Oct 2023
Towards Few-Call Model Stealing via Active Self-Paced Knowledge Distillation and Diffusion-Based Image Generation
Towards Few-Call Model Stealing via Active Self-Paced Knowledge Distillation and Diffusion-Based Image Generation
Vlad Hondru
Radu Tudor Ionescu
DiffM
44
1
0
29 Sep 2023
Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing
  Inference Serving Systems
Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems
Debopam Sanyal
Jui-Tse Hung
Manavi Agrawal
Prahlad Jasti
Shahab Nikkhoo
S. Jha
Tianhao Wang
Sibin Mohan
Alexey Tumanov
39
0
0
03 Jul 2023
Fast and Private Inference of Deep Neural Networks by Co-designing
  Activation Functions
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions
Abdulrahman Diaa
L. Fenaux
Thomas Humphries
Marian Dietz
Faezeh Ebrahimianghazani
...
Nils Lukas
Rasoul Akhavan Mahdavi
Simon Oya
Ehsan Amjadian
Florian Kerschbaum
18
6
0
14 Jun 2023
On the Limitations of Model Stealing with Uncertainty Quantification
  Models
On the Limitations of Model Stealing with Uncertainty Quantification Models
David Pape
Sina Daubener
Thorsten Eisenhofer
Antonio Emanuele Cinà
Lea Schonherr
30
3
0
09 May 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
35
9
0
17 Apr 2023
Model Extraction Attacks on Split Federated Learning
Model Extraction Attacks on Split Federated Learning
Jingtao Li
Adnan Siraj Rakin
Xing Chen
Li Yang
Zhezhi He
Deliang Fan
C. Chakrabarti
FedML
55
5
0
13 Mar 2023
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural
  Networks with Neuromorphic Data
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Gorka Abad
Oguzhan Ersoy
S. Picek
A. Urbieta
AAML
21
17
0
13 Feb 2023
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks
  against Interpretable Models
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Interpretable Models
Abdullah Çaglar Öksüz
Anisa Halimi
Erman Ayday
ELM
AAML
21
2
0
04 Feb 2023
A Comparative Study of Image Disguising Methods for Confidential
  Outsourced Learning
A Comparative Study of Image Disguising Methods for Confidential Outsourced Learning
Sagar Sharma
Yuechun Gu
Keke Chen
25
0
0
31 Dec 2022
"Real Attackers Don't Compute Gradients": Bridging the Gap Between
  Adversarial ML Research and Practice
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese
Hyrum S. Anderson
Savino Dambra
D. Freeman
Fabio Pierazzi
Kevin A. Roundy
AAML
31
75
0
29 Dec 2022
A Practical Introduction to Side-Channel Extraction of Deep Neural
  Network Parameters
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters
Raphael Joud
Pierre-Alain Moëllic
S. Pontié
J. Rigaud
AAML
MIACV
MLAU
21
13
0
10 Nov 2022
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep
  Neural Networks
Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Jiyang Guan
Jian Liang
R. He
AAML
MLAU
40
29
0
21 Oct 2022
Differentially Private Counterfactuals via Functional Mechanism
Differentially Private Counterfactuals via Functional Mechanism
Fan Yang
Qizhang Feng
Kaixiong Zhou
Jiahao Chen
Xia Hu
24
8
0
04 Aug 2022
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yang Bai
Yong Jiang
Shutao Xia
Xiaochun Cao
Kui Ren
AAML
38
12
0
04 Aug 2022
Careful What You Wish For: on the Extraction of Adversarially Trained
  Models
Careful What You Wish For: on the Extraction of Adversarially Trained Models
Kacem Khaled
Gabriela Nicolescu
F. Magalhães
MIACV
AAML
27
4
0
21 Jul 2022
I Know What You Trained Last Summer: A Survey on Stealing Machine
  Learning Models and Defences
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
39
106
0
16 Jun 2022
Reconstructing Training Data from Trained Neural Networks
Reconstructing Training Data from Trained Neural Networks
Niv Haim
Gal Vardi
Gilad Yehudai
Ohad Shamir
Michal Irani
40
132
0
15 Jun 2022
Machine Learning for Microcontroller-Class Hardware: A Review
Machine Learning for Microcontroller-Class Hardware: A Review
Swapnil Sayan Saha
S. Sandha
Mani B. Srivastava
19
117
0
29 May 2022
Learning to Reverse DNNs from AI Programs Automatically
Learning to Reverse DNNs from AI Programs Automatically
Simin Chen
Hamed Khanpour
Cong Liu
Wei Yang
35
15
0
20 May 2022
On the Difficulty of Defending Self-Supervised Learning against Model
  Extraction
On the Difficulty of Defending Self-Supervised Learning against Model Extraction
Adam Dziedzic
Nikita Dhawan
Muhammad Ahmad Kaleem
Jonas Guan
Nicolas Papernot
MIACV
46
22
0
16 May 2022
The MeVer DeepFake Detection Service: Lessons Learnt from Developing and
  Deploying in the Wild
The MeVer DeepFake Detection Service: Lessons Learnt from Developing and Deploying in the Wild
Spyridon Baxevanakis
Giorgos Kordopatis-Zilos
Panagiotis Galopoulos
Lazaros Apostolidis
Killian Levacher
Ipek B. Schlicht
Denis Teyssou
I. Kompatsiaris
Symeon Papadopoulos
34
8
0
27 Apr 2022
Stealing and Evading Malware Classifiers and Antivirus at Low False
  Positive Conditions
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions
M. Rigaki
Sebastian Garcia
AAML
20
10
0
13 Apr 2022
NNReArch: A Tensor Program Scheduling Framework Against Neural Network
  Architecture Reverse Engineering
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering
Yukui Luo
Shijin Duan
Gongye Cheng
Yunsi Fei
Xiaolin Xu
9
8
0
22 Mar 2022
Margin-distancing for safe model explanation
Margin-distancing for safe model explanation
Tom Yan
Chicheng Zhang
28
3
0
23 Feb 2022
Fingerprinting Deep Neural Networks Globally via Universal Adversarial
  Perturbations
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Zirui Peng
Shaofeng Li
Guoxing Chen
Cheng Zhang
Haojin Zhu
Minhui Xue
AAML
FedML
31
66
0
17 Feb 2022
Hardness of Noise-Free Learning for Two-Hidden-Layer Neural Networks
Hardness of Noise-Free Learning for Two-Hidden-Layer Neural Networks
Sitan Chen
Aravind Gollakota
Adam R. Klivans
Raghu Meka
21
30
0
10 Feb 2022
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
MEGA: Model Stealing via Collaborative Generator-Substitute Networks
Chi Hong
Jiyue Huang
L. Chen
13
2
0
31 Jan 2022
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained
  Encoders
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Tianshuo Cong
Xinlei He
Yang Zhang
8
52
0
27 Jan 2022
Security for Machine Learning-based Software Systems: a survey of
  threats, practices and challenges
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges
Huaming Chen
Muhammad Ali Babar
AAML
29
21
0
12 Jan 2022
Model Stealing Attacks Against Inductive Graph Neural Networks
Model Stealing Attacks Against Inductive Graph Neural Networks
Yun Shen
Xinlei He
Yufei Han
Yang Zhang
16
60
0
15 Dec 2021
Defending against Model Stealing via Verifying Embedded External
  Features
Defending against Model Stealing via Verifying Embedded External Features
Yiming Li
Linghui Zhu
Xiaojun Jia
Yong Jiang
Shutao Xia
Xiaochun Cao
AAML
35
61
0
07 Dec 2021
Property Inference Attacks Against GANs
Property Inference Attacks Against GANs
Junhao Zhou
Yufei Chen
Chao Shen
Yang Zhang
AAML
MIACV
28
52
0
15 Nov 2021
12
Next