I know what you trained last summer: A survey on stealing machine learning models and defences

D Oliynyk, R Mayer, A Rauber - ACM Computing Surveys, 2023 - dl.acm.org
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making
even the most complex Machine Learning models available for clients via, eg, a pay-per …

The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

High accuracy and high fidelity extraction of neural networks

M Jagielski, N Carlini, D Berthelot, A Kurakin… - 29th USENIX security …, 2020 - usenix.org
In a model extraction attack, an adversary steals a copy of a remotely deployed machine
learning model, given oracle prediction access. We taxonomize model extraction attacks …

Privacy side channels in machine learning systems

E Debenedetti, G Severi, N Carlini… - 33rd USENIX Security …, 2024 - usenix.org
Most current approaches for protecting privacy in machine learning (ML) assume that
models exist in a vacuum. Yet, in reality, these models are part of larger systems that include …

Entangled watermarks as a defense against model extraction

H Jia, CA Choquette-Choo, V Chandrasekaran… - 30th USENIX security …, 2021 - usenix.org
Machine learning involves expensive data collection and training procedures. Model owners
may be concerned that valuable intellectual property can be leaked if adversaries mount …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

Testing deep neural networks

Y Sun, X Huang, D Kroening, J Sharp, M Hill… - arXiv preprint arXiv …, 2018 - arxiv.org
Deep neural networks (DNNs) have a wide range of applications, and software employing
them must be thoroughly tested, especially in safety-critical domains. However, traditional …

Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures

M Yan, CW Fletcher, J Torrellas - 29th USENIX Security Symposium …, 2020 - usenix.org
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …

Deepsteal: Advanced model extractions leveraging efficient weight stealing in memories

AS Rakin, MHI Chowdhuryy, F Yao… - 2022 IEEE symposium …, 2022 - ieeexplore.ieee.org
Recent advancements in Deep Neural Networks (DNNs) have enabled widespread
deployment in multiple security-sensitive domains. The need for resource-intensive training …

Deep learning-based autonomous driving systems: A survey of attacks and defenses

Y Deng, T Zhang, G Lou, X Zheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The rapid development of artificial intelligence, especially deep learning technology, has
advanced autonomous driving systems (ADSs) by providing precise control decisions to …