I know what you trained last summer: A survey on stealing machine learning models and defences

D Oliynyk, R Mayer, A Rauber - ACM Computing Surveys, 2023 - dl.acm.org
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making
even the most complex Machine Learning models available for clients via, eg, a pay-per …

A survey on cyber-physical systems security

Z Yu, H Gao, X Cong, N Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …

Defending against model stealing via verifying embedded external features

Y Li, L Zhu, X Jia, Y Jiang, ST Xia, X Cao - Proceedings of the AAAI …, 2022 - ojs.aaai.org
Obtaining a well-trained model involves expensive data collection and training procedures,
therefore the model is a valuable intellectual property. Recent studies revealed that …

Attacks on machine learning systems-common problems and methods

E Ilyushin, D Namiot, I Chizhov - International Journal of Open Information …, 2022 - injoit.org
The paper deals with the problem of adversarial attacks on machine learning systems. Such
attacks are understood as special actions on the elements of the machine learning pipeline …

D-dae: Defense-penetrating model extraction attacks

Y Chen, R Guan, X Gong, J Dong… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Recent studies show that machine learning models are vulnerable to model extraction
attacks, where the adversary builds a substitute model that achieves almost the same …

A comprehensive analysis of privacy protection techniques developed for COVID-19 pandemic

A Majeed, SO Hwang - IEEE Access, 2021 - ieeexplore.ieee.org
Since the emergence of coronavirus disease–2019 (COVID-19) outbreak, every country has
implemented digital solutions in the form of mobile applications, web-based frameworks …

[HTML][HTML] Supervised and unsupervised machine learning approaches using Sentinel data for flood mapping and damage assessment in Mozambique

M Nhangumbe, A Nascetti, S Georganos… - … Applications: Society and …, 2023 - Elsevier
Natural hazards, such as flooding, have been negatively impacting developed and
emerging economies alike. The effects of floods are more prominent in countries of the …

Defending against model extraction attacks with physical unclonable function

D Li, D Liu, Y Guo, Y Ren, J Su, J Liu - Information Sciences, 2023 - Elsevier
Abstract Machine learning models, especially deep neural network (DNN) models, have
widespread and valuable applications in business activities. Training a deep learning model …

On mask-based image set desensitization with recognition support

Q Li, J Liu, Y Sun, C Zhang, D Dou - Applied Intelligence, 2024 - Springer
Abstract In recent years, Deep Neural Networks (DNN) have emerged as a practical method
for image recognition. The raw data, which contain sensitive information, are generally …

Fusion: Efficient and secure inference resilient to malicious servers

C Dong, J Weng, JN Liu, Y Zhang, Y Tong… - arXiv preprint arXiv …, 2022 - arxiv.org
In secure machine learning inference, most of the schemes assume that the server is semi-
honest (honestly following the protocol but attempting to infer additional information) …