2022
DOI: 10.1109/tdsc.2021.3069258
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…However, these defenses may significantly reduce the performance of legitimate users and could even be bypassed by adaptive attacks (Jia et al 2021;Maini, Yaghini, and Papernot 2021). Other works (Kesarwani et al 2018;Juuti et al 2019;Yan et al 2021) detected model stealing by identifying malicious queries. However, these methods relied on some assumptions of malicious query patterns, which may not be adopted by the adversaries in practice.…”
Section: Defenses Against Model Stealingmentioning
confidence: 99%
“…However, these defenses may significantly reduce the performance of legitimate users and could even be bypassed by adaptive attacks (Jia et al 2021;Maini, Yaghini, and Papernot 2021). Other works (Kesarwani et al 2018;Juuti et al 2019;Yan et al 2021) detected model stealing by identifying malicious queries. However, these methods relied on some assumptions of malicious query patterns, which may not be adopted by the adversaries in practice.…”
Section: Defenses Against Model Stealingmentioning
confidence: 99%
“…Yan et al used an ESA to steal a MLP under a differential privacy defence [13], which adds noise to the outputs laying close to the decision boundary [75] (cf. Section 9.2.3).…”
Section: Equation-solving Attacksmentioning
confidence: 99%
“…In [11] the authors claim that this watermarking technique can be effective against knockoff SMA [3]. This approach is called monitor [95] or monitoring-based [13]. Kesarwani et al [95] implemented a monitor which estimates coverage of the data space by the queries issued, and can from this infer a kind-of "extraction completeness status".…”
Section: Defences Against Model Stealingmentioning
confidence: 99%
See 2 more Smart Citations