Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
I know what you trained last summer: A survey on stealing machine learning models and defences
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making
even the most complex Machine Learning models available for clients via, eg, a pay-per …
even the most complex Machine Learning models available for clients via, eg, a pay-per …
Adversarial machine learning attacks and defense methods in the cyber security domain
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …
algorithms, have been widely used in many fields, including cyber security. However …
Privacy side channels in machine learning systems
Most current approaches for protecting privacy in machine learning (ML) assume that
models exist in a vacuum. Yet, in reality, these models are part of larger systems that include …
models exist in a vacuum. Yet, in reality, these models are part of larger systems that include …
Privacy risks of general-purpose language models
Recently, a new paradigm of building general-purpose language models (eg, Google's Bert
and OpenAI's GPT-2) in Natural Language Processing (NLP) for text feature extraction, a …
and OpenAI's GPT-2) in Natural Language Processing (NLP) for text feature extraction, a …
Deepsteal: Advanced model extractions leveraging efficient weight stealing in memories
Recent advancements in Deep Neural Networks (DNNs) have enabled widespread
deployment in multiple security-sensitive domains. The need for resource-intensive training …
deployment in multiple security-sensitive domains. The need for resource-intensive training …
Adversarial frontier stitching for remote neural network watermarking
The state-of-the-art performance of deep learning models comes at a high cost for
companies and institutions, due to the tedious data collection and the heavy processing …
companies and institutions, due to the tedious data collection and the heavy processing …
Securing AI‐based healthcare systems using blockchain technology: A state‐of‐the‐art systematic literature review and future research directions
Healthcare institutions are progressively integrating artificial intelligence (AI) into their
operations. The extraordinary potential of AI is restricted by insufficient medical data for AI …
operations. The extraordinary potential of AI is restricted by insufficient medical data for AI …
Quantifying privacy leakage in graph embedding
Graph embeddings have been proposed to map graph data to low dimensional space for
downstream processing (eg, node classification or link prediction). With the increasing …
downstream processing (eg, node classification or link prediction). With the increasing …
Hermes attack: Steal {DNN} models with lossless inference accuracy
Deep Neural Network (DNN) models become one of the most valuable enterprise assets
due to their critical roles in all aspects of applications. With the trend of privatization …
due to their critical roles in all aspects of applications. With the trend of privatization …
What Was Your Prompt? A Remote Keylogging Attack on {AI} Assistants
AI assistants are becoming an integral part of society, used for asking advice or help in
personal and confidential issues. In this paper, we unveil a novel side-channel that can be …
personal and confidential issues. In this paper, we unveil a novel side-channel that can be …