2021
DOI: 10.1007/978-3-030-71852-7_2
|View full text |Cite
|
Sign up to set email alerts
|

DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Moreover, in the transfer learning scenario, Chen et al [10] propose a fingerprinting attack to infer the origin of a student model, i.e., the teacher model that it transferred from. This fingerprinting utilizes reverse engineering approaches to generating the synthetic input that will be classified as the same label as the probing input by the models belonging to the same origin.…”
Section: B Watermarking Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, in the transfer learning scenario, Chen et al [10] propose a fingerprinting attack to infer the origin of a student model, i.e., the teacher model that it transferred from. This fingerprinting utilizes reverse engineering approaches to generating the synthetic input that will be classified as the same label as the probing input by the models belonging to the same origin.…”
Section: B Watermarking Approachesmentioning
confidence: 99%
“…For NLP tasks, we randomly sample instances from the candidates WikiText-103, SNLI, MRPC, IMDB to compose the shadow dataset. Moreover, we use 'bbb' as the watermark pattern 10 and insert it into these sampled instances.…”
Section: A Experimental Setupmentioning
confidence: 99%