I know what you trained last summer: A survey on stealing machine learning models and defences

D Oliynyk, R Mayer, A Rauber - ACM Computing Surveys, 2023 - dl.acm.org
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making
even the most complex Machine Learning models available for clients via, eg, a pay-per …

{PTW}: Pivotal Tuning Watermarking for {Pre-Trained} Image Generators

N Lukas, F Kerschbaum - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Deepfakes refer to content synthesized using deep generators, which, when misused, have
the potential to erode trust in digital media. Synthesizing high-quality deepfakes requires …

Quda: Query-limited data-free model extraction

Z Lin, K Xu, C Fang, H Zheng… - Proceedings of the …, 2023 - dl.acm.org
Model extraction attack typically refers to extracting non-public information from a black-box
machine learning model. Its unauthorized nature poses significant threat to intellectual …

[PDF][PDF] False claims against model ownership resolution

J Liu, R Zhang, S Szyller, K Ren, N Asokan - arXiv preprint arXiv …, 2023 - usenix.org
Deep neural network (DNN) models are valuable intellectual property of model owners,
constituting a competitive advantage. Therefore, it is crucial to develop techniques to protect …

Grove: Ownership verification of graph neural networks using embeddings

A Waheed, V Duddu, N Asokan - arXiv preprint arXiv:2304.08566, 2023 - arxiv.org
Graph neural networks (GNNs) have emerged as a state-of-the-art approach to model and
draw inferences from large scale graph-structured data in various application settings such …

Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation

D Mi, Y Zhang, LY Zhang, S Hu, Q Zhong… - Proceedings of the …, 2024 - ojs.aaai.org
Model extraction attacks (MEAs) enable an attacker to replicate the functionality of a victim
deep neural network (DNN) model by only querying its API service remotely, posing a …

A two-stage model extraction attack on GANs with a small collected dataset

H Sun, T Zhu, W Chang, W Zhou - Computers & Security, 2024 - Elsevier
Due to their capacity for image generation, GAN models may be considered as a solution for
the use of private data, which enhances their commercial value. However, unlike …

Removing watermarks for image processing networks via referenced subspace attention

Y Xue, Y Zhu, Z Zhu, S Li, Z Qian… - The Computer …, 2024 - academic.oup.com
Deep neural network model extraction attack is the process of retraining a surrogate model
based on the outputs of a target model with a given set of inputs. Such attacks are hard to …

First to possess his statistics: Data-free model extraction attack on tabular data

M Tasumi, K Iwahana, N Yanai, K Shishido… - arXiv preprint arXiv …, 2021 - arxiv.org
Model extraction attacks are a kind of attacks where an adversary obtains a machine
learning model whose performance is comparable with one of the victim model through …

Model Stealing Attacks Against Vision-Language Models

Y Wu, R Wen, M Backes, N Yu, Y Zhang - 2022 - openreview.net
Vision-language models have flourished these years and are regarded as promising
solutions to vision-language tasks. However, training vision-language models always …