ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2004.15015
  4. Cited By
Imitation Attacks and Defenses for Black-box Machine Translation Systems
v1v2v3 (latest)

Imitation Attacks and Defenses for Black-box Machine Translation Systems

Conference on Empirical Methods in Natural Language Processing (EMNLP), 2020
30 April 2020
Eric Wallace
Mitchell Stern
Basel Alomair
    AAML
ArXiv (abs)PDFHTML

Papers citing "Imitation Attacks and Defenses for Black-box Machine Translation Systems"

50 / 77 papers shown
SoK: Are Watermarks in LLMs Ready for Deployment?
SoK: Are Watermarks in LLMs Ready for Deployment?
Kieu Dang
Phung Lai
Nhathai Phan
Yelong Shen
Ruoming Jin
Abdallah Khreishah
My T. Thai
270
2
0
24 Dec 2025
RegionMarker: A Region-Triggered Semantic Watermarking Framework for Embedding-as-a-Service Copyright Protection
RegionMarker: A Region-Triggered Semantic Watermarking Framework for Embedding-as-a-Service Copyright Protection
Shufan Yang
Zifeng Cheng
Zhiwei Jiang
Yafeng Yin
Cong Wang
Shiping Ge
Yuchen Fu
Qing Gu
WaLM
358
1
0
17 Nov 2025
$δ$-STEAL: LLM Stealing Attack with Local Differential Privacy
δδδ-STEAL: LLM Stealing Attack with Local Differential Privacy
Kieu Dang
Phung Lai
Nhathai Phan
Yelong Shen
R. Jin
Abdallah Khreishah
AAML
171
2
0
24 Oct 2025
Selective Adversarial Attacks on LLM Benchmarks
Selective Adversarial Attacks on LLM Benchmarks
Ivan Dubrovsky
Anastasia Orlova
Illarion Iov
Nina Gubina
Irena Gureeva
Alexey Zaytsev
AAML
177
0
0
15 Oct 2025
Basic Reading Distillation
Basic Reading DistillationAnnual Meeting of the Association for Computational Linguistics (ACL), 2025
Zhi Zhou
Sirui Miao
Xiangyu Duan
Hao Yang
M. Zhang
238
0
0
26 Jul 2025
Towards Secure MLOps: Surveying Attacks, Mitigation Strategies, and Research Challenges
Towards Secure MLOps: Surveying Attacks, Mitigation Strategies, and Research Challenges
Raj Patel
Himanshu Tripathi
Jasper Stone
Noorbakhsh Amiri Golilarz
Sudip Mittal
Shahram Rahimi
Vini Chaudhary
AAML
308
4
0
30 May 2025
Attack and defense techniques in large language models: A survey and new perspectives
Attack and defense techniques in large language models: A survey and new perspectives
Zhiyu Liao
Kang Chen
Yuanguo Lin
Kangkang Li
Yunxuan Liu
Hefeng Chen
Xingwang Huang
Yuanhui Yu
AAML
357
13
0
02 May 2025
StyleRec: A Benchmark Dataset for Prompt Recovery in Writing Style Transformation
StyleRec: A Benchmark Dataset for Prompt Recovery in Writing Style TransformationBigData Congress [Services Society] (BSS), 2024
Shenyang Liu
Yang Gao
Shaoyan Zhai
Liqiang Wang
370
2
0
06 Apr 2025
Towards Data Governance of Frontier AI Models
Towards Data Governance of Frontier AI Models
Jason Hausenloy
Duncan McClements
Madhavendra Thakur
561
3
0
05 Dec 2024
NMT-Obfuscator Attack: Ignore a sentence in translation with only one
  word
NMT-Obfuscator Attack: Ignore a sentence in translation with only one word
Sahar Sadrizadeh
César Descalzo
Ljiljana Dolamic
P. Frossard
AAML
341
0
0
19 Nov 2024
WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation Watermarks
WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation WatermarksAnnual Meeting of the Association for Computational Linguistics (ACL), 2024
Anudeex Shetty
Xingliang Yuan
Jey Han Lau
WaLM
434
7
0
29 Aug 2024
Rethinking Targeted Adversarial Attacks For Neural Machine Translation
Rethinking Targeted Adversarial Attacks For Neural Machine Translation
Junjie Wu
Lemao Liu
Wei Bi
Dit-Yan Yeung
AAML
226
2
0
07 Jul 2024
DORY: Deliberative Prompt Recovery for LLM
DORY: Deliberative Prompt Recovery for LLM
Lirong Gao
Ru Peng
Yiming Zhang
Junbo Zhao
378
12
0
31 May 2024
A Constraint-Enforcing Reward for Adversarial Attacks on Text
  Classifiers
A Constraint-Enforcing Reward for Adversarial Attacks on Text Classifiers
Tom Roth
Inigo Jauregi Unanue
A. Abuadbba
Massimo Piccardi
AAMLSILM
313
2
0
20 May 2024
An Empirical Study on the Robustness of Massively Multilingual Neural
  Machine Translation
An Empirical Study on the Robustness of Massively Multilingual Neural Machine TranslationInternational Conference on Language Resources and Evaluation (LREC), 2024
Supryadi Supryadi
Leiyu Pan
Deyi Xiong
196
0
0
13 May 2024
Revisiting character-level adversarial attacks
Revisiting character-level adversarial attacks
Elias Abad Rocamora
Yongtao Wu
Fanghui Liu
Grigorios G. Chrysos
Volkan Cevher
AAML
302
6
0
07 May 2024
ModelShield: Adaptive and Robust Watermark against Model Extraction Attack
ModelShield: Adaptive and Robust Watermark against Model Extraction AttackIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2024
Kaiyi Pang
Tao Qi
Chuhan Wu
Minhao Bai
Minghu Jiang
Yongfeng Huang
AAMLWaLM
617
12
0
03 May 2024
WARDEN: Multi-Directional Backdoor Watermarks for Embedding-as-a-Service
  Copyright Protection
WARDEN: Multi-Directional Backdoor Watermarks for Embedding-as-a-Service Copyright Protection
Anudeex Shetty
Yue Teng
Ke He
Xingliang Yuan
WaLM
375
15
0
03 Mar 2024
Generative Models are Self-Watermarked: Declaring Model Authentication
  through Re-Generation
Generative Models are Self-Watermarked: Declaring Model Authentication through Re-Generation
Aditya Desu
Xuanli He
Xingliang Yuan
Wei Lu
WIGM
273
5
0
23 Feb 2024
Watermarking Makes Language Models Radioactive
Watermarking Makes Language Models Radioactive
Tom Sander
Pierre Fernandez
Alain Durmus
Matthijs Douze
Teddy Furon
WaLM
225
46
0
22 Feb 2024
Stolen Subwords: Importance of Vocabularies for Machine Translation
  Model Stealing
Stolen Subwords: Importance of Vocabularies for Machine Translation Model Stealing
Vilém Zouhar
AAML
227
0
0
29 Jan 2024
Language Model Inversion
Language Model InversionInternational Conference on Learning Representations (ICLR), 2023
John X. Morris
Wenting Zhao
Justin T. Chiu
Vitaly Shmatikov
Alexander M. Rush
457
65
0
22 Nov 2023
Identifying and Mitigating Privacy Risks Stemming from Language Models:
  A Survey
Identifying and Mitigating Privacy Risks Stemming from Language Models: A Survey
Victoria Smith
Ali Shahin Shamsabadi
Carolyn Ashurst
Adrian Weller
PILM
545
42
0
27 Sep 2023
Anchor Points: Benchmarking Models with Much Fewer Examples
Anchor Points: Benchmarking Models with Much Fewer ExamplesConference of the European Chapter of the Association for Computational Linguistics (EACL), 2023
Rajan Vivek
Kawin Ethayarajh
Diyi Yang
Douwe Kiela
ALM
366
55
0
14 Sep 2023
A Classification-Guided Approach for Adversarial Attacks against Neural
  Machine Translation
A Classification-Guided Approach for Adversarial Attacks against Neural Machine TranslationConference of the European Chapter of the Association for Computational Linguistics (EACL), 2023
Sahar Sadrizadeh
Ljiljana Dolamic
P. Frossard
AAMLSILM
300
4
0
29 Aug 2023
Isolation and Induction: Training Robust Deep Neural Networks against
  Model Stealing Attacks
Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing AttacksACM Multimedia (ACM MM), 2023
Jun Guo
Aishan Liu
Xingyu Zheng
Yaning Tan
Yisong Xiao
Yichao Wu
Xianglong Liu
AAML
278
17
0
02 Aug 2023
Make Text Unlearnable: Exploiting Effective Patterns to Protect Personal
  Data
Make Text Unlearnable: Exploiting Effective Patterns to Protect Personal Data
Xinzhe Li
Ming Liu
Shang Gao
MU
284
8
0
02 Jul 2023
A Survey on Out-of-Distribution Evaluation of Neural NLP Models
A Survey on Out-of-Distribution Evaluation of Neural NLP ModelsInternational Joint Conference on Artificial Intelligence (IJCAI), 2023
Xinzhe Li
Ming Liu
Shang Gao
Wray Buntine
307
24
0
27 Jun 2023
You Don't Need Robust Machine Learning to Manage Adversarial Attack
  Risks
You Don't Need Robust Machine Learning to Manage Adversarial Attack Risks
Edward Raff
M. Benaroch
Andrew L. Farris
AAML
253
6
0
16 Jun 2023
Red Teaming Language Model Detectors with Language Models
Red Teaming Language Model Detectors with Language ModelsTransactions of the Association for Computational Linguistics (TACL), 2023
Zhouxing Shi
Yihan Wang
Fan Yin
Xiangning Chen
Kai-Wei Chang
Cho-Jui Hsieh
DeLMO
355
68
0
31 May 2023
The False Promise of Imitating Proprietary LLMs
The False Promise of Imitating Proprietary LLMs
Arnav Gudibande
Eric Wallace
Charles Burton Snell
Xinyang Geng
Hao Liu
Pieter Abbeel
Sergey Levine
Dawn Song
ALM
484
267
0
25 May 2023
Iterative Adversarial Attack on Image-guided Story Ending Generation
Iterative Adversarial Attack on Image-guided Story Ending GenerationIEEE transactions on multimedia (IEEE TMM), 2023
Youze Wang
Wenbo Hu
Richang Hong
283
11
0
16 May 2023
White-Box Multi-Objective Adversarial Attack on Dialogue Generation
White-Box Multi-Objective Adversarial Attack on Dialogue GenerationAnnual Meeting of the Association for Computational Linguistics (ACL), 2023
Yufei Li
Zexin Li
Ying Gao
Cong Liu
AAML
360
21
0
05 May 2023
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
GrOVe: Ownership Verification of Graph Neural Networks using EmbeddingsIEEE Symposium on Security and Privacy (IEEE S&P), 2023
Asim Waheed
Vasisht Duddu
Nadarajah Asokan
370
19
0
17 Apr 2023
False Claims against Model Ownership Resolution
False Claims against Model Ownership ResolutionUSENIX Security Symposium (USENIX Security), 2023
Jian Liu
Rui Zhang
S. Szyller
Kui Ren
Nirmal Asokan
AAMLMLAU
846
22
0
13 Apr 2023
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
  Contemporary Survey
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey
Yulong Wang
Tong Sun
Shenghong Li
Xinnan Yuan
W. Ni
Ekram Hossain
H. Vincent Poor
AAML
351
34
0
11 Mar 2023
Stealing the Decoding Algorithms of Language Models
Stealing the Decoding Algorithms of Language ModelsConference on Computer and Communications Security (CCS), 2023
A. Naseh
Kalpesh Krishna
Mohit Iyyer
Amir Houmansadr
MLAU
452
31
0
08 Mar 2023
Targeted Adversarial Attacks against Neural Machine Translation
Targeted Adversarial Attacks against Neural Machine TranslationIEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2023
Sahar Sadrizadeh
AmirHossein Dabiri Aghdam
Ljiljana Dolamic
P. Frossard
AAML
293
15
0
02 Mar 2023
Protecting Language Generation Models via Invisible Watermarking
Protecting Language Generation Models via Invisible WatermarkingInternational Conference on Machine Learning (ICML), 2023
Xuandong Zhao
Yu-Xiang Wang
Lei Li
WaLM
468
114
0
06 Feb 2023
TransFool: An Adversarial Attack against Neural Machine Translation
  Models
TransFool: An Adversarial Attack against Neural Machine Translation Models
Sahar Sadrizadeh
Ljiljana Dolamic
P. Frossard
SILMAAML
374
15
0
02 Feb 2023
Defending Against Disinformation Attacks in Open-Domain Question
  Answering
Defending Against Disinformation Attacks in Open-Domain Question AnsweringConference of the European Chapter of the Association for Computational Linguistics (EACL), 2022
Orion Weller
Aleem Khan
Nathaniel Weir
Dawn J Lawrie
Benjamin Van Durme
AAML
467
13
0
20 Dec 2022
Learned-Database Systems Security
Learned-Database Systems Security
R. Schuster
Jinyi Zhou
Thorsten Eisenhofer
Paul Grubbs
Nicolas Papernot
AAML
463
2
0
20 Dec 2022
SSD-LM: Semi-autoregressive Simplex-based Diffusion Language Model for
  Text Generation and Modular Control
SSD-LM: Semi-autoregressive Simplex-based Diffusion Language Model for Text Generation and Modular ControlAnnual Meeting of the Association for Computational Linguistics (ACL), 2022
Xiaochuang Han
Sachin Kumar
Yulia Tsvetkov
424
172
0
31 Oct 2022
Extracted BERT Model Leaks More Information than You Think!
Extracted BERT Model Leaks More Information than You Think!Conference on Empirical Methods in Natural Language Processing (EMNLP), 2022
Xuanli He
Chen Chen
Lingjuan Lyu
Xingliang Yuan
SILMMIACV
237
7
0
21 Oct 2022
Probabilistic Inverse Modeling: An Application in Hydrology
Probabilistic Inverse Modeling: An Application in HydrologySDM (SDM), 2022
Somya Sharma
Rahul Ghosh
Arvind Renganathan
Xiang Li
Snigdhansu Chatterjee
John L. Nieber
C. Duffy
Vipin Kumar
AI4CE
234
1
0
12 Oct 2022
Distillation-Resistant Watermarking for Model Protection in NLP
Distillation-Resistant Watermarking for Model Protection in NLPConference on Empirical Methods in Natural Language Processing (EMNLP), 2022
Xuandong Zhao
Lei Li
Yu-Xiang Wang
WaLM
311
31
0
07 Oct 2022
CATER: Intellectual Property Protection on Text Generation APIs via
  Conditional Watermarks
CATER: Intellectual Property Protection on Text Generation APIs via Conditional WatermarksNeural Information Processing Systems (NeurIPS), 2022
Xuanli He
Xingliang Yuan
Yi Zeng
Lingjuan Lyu
Fangzhao Wu
Jiwei Li
R. Jia
WaLM
420
95
0
19 Sep 2022
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural
  Ranking Models
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking ModelsConference on Computer and Communications Security (CCS), 2022
Jiawei Liu
Yangyang Kang
Di Tang
Kaisong Song
Changlong Sun
Luyi Xing
Wei Lu
Xiaozhong Liu
AAML
322
58
0
14 Sep 2022
The Ethical Need for Watermarks in Machine-Generated Language
The Ethical Need for Watermarks in Machine-Generated Language
A. Grinbaum
Laurynas Adomaitis
WaLM
204
40
0
07 Sep 2022
Threat Assessment in Machine Learning based Systems
Threat Assessment in Machine Learning based Systems
L. Tidjon
Foutse Khomh
182
22
0
30 Jun 2022
12
Next
Page 1 of 2