I know what you trained last summer: A survey on stealing machine learning models and defences

D Oliynyk, R Mayer, A Rauber - ACM Computing Surveys, 2023 - dl.acm.org
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making
even the most complex Machine Learning models available for clients via, eg, a pay-per …

A comprehensive survey on trustworthy recommender systems

W Fan, X Zhao, X Chen, J Su, J Gao, L Wang… - arXiv preprint arXiv …, 2022 - arxiv.org
As one of the most successful AI-powered applications, recommender systems aim to help
people make appropriate decisions in an effective and efficient way, by providing …

[HTML][HTML] Modeling threats to AI-ML systems using STRIDE

L Mauri, E Damiani - Sensors, 2022 - mdpi.com
The application of emerging technologies, such as Artificial Intelligence (AI), entails risks that
need to be addressed to ensure secure and trustworthy socio-technical infrastructures …

When deep learning meets watermarking: A survey of application, attacks and defenses

H Chen, C Liu, T Zhu, W Zhou - Computer Standards & Interfaces, 2024 - Elsevier
Deep learning has been used to address various problems in a range of domains within
both academia and industry. However, the issue of intellectual property with deep learning …

A two-stage model extraction attack on GANs with a small collected dataset

H Sun, T Zhu, W Chang, W Zhou - Computers & Security, 2024 - Elsevier
Due to their capacity for image generation, GAN models may be considered as a solution for
the use of private data, which enhances their commercial value. However, unlike …

[HTML][HTML] Exploring the Efficacy of Learning Techniques in Model Extraction Attacks on Image Classifiers: A Comparative Study

D Han, R Babaei, S Zhao, S Cheng - Applied Sciences, 2024 - mdpi.com
In the rapidly evolving landscape of cybersecurity, model extraction attacks pose a
significant challenge, undermining the integrity of machine learning models by enabling …

Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network

Z Liu, J Hu, Y Liu, K Roy, X Yuan, J Xu - IEEE Access, 2023 - ieeexplore.ieee.org
Adversarial attacks have threatened the credibility of machine learning models and cast
doubts over the integrity of data. The attacks have created much harm in the fields of …

A Survey on Privacy in Graph Neural Networks: Attacks, Preservation, and Applications

Y Zhang, Y Zhao, Z Li, X Cheng, Y Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
Graph Neural Networks (GNNs) have gained significant attention owing to their ability to
handle graph-structured data and the improvement in practical applications. However, many …

PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems

KZ Teng, T Limbasiya, F Turrin, YL Aung… - Proceedings of the 9th …, 2023 - dl.acm.org
Modern Autonomous Vehicles (AVs) leverage road context information collected through
sensors (eg, LiDAR, radar, and camera) to support the automated driving experience. Once …

GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems

E Efatinasab, F Marchiori, D Donadel… - arXiv preprint arXiv …, 2023 - arxiv.org
For many years, car keys have been the sole mean of authentication in vehicles. Whether
the access control process is physical or wireless, entrusting the ownership of a vehicle to a …