I know what you trained last summer: A survey on stealing machine learning models and defences

D Oliynyk, R Mayer, A Rauber - ACM Computing Surveys, 2023 - dl.acm.org
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making
even the most complex Machine Learning models available for clients via, eg, a pay-per …

Adversarial machine learning attacks and defense methods in the cyber security domain

I Rosenberg, A Shabtai, Y Elovici… - ACM Computing Surveys …, 2021 - dl.acm.org
In recent years, machine learning algorithms, and more specifically deep learning
algorithms, have been widely used in many fields, including cyber security. However …

Privacy side channels in machine learning systems

E Debenedetti, G Severi, N Carlini… - 33rd USENIX Security …, 2024 - usenix.org
Most current approaches for protecting privacy in machine learning (ML) assume that
models exist in a vacuum. Yet, in reality, these models are part of larger systems that include …

Privacy risks of general-purpose language models

X Pan, M Zhang, S Ji, M Yang - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Recently, a new paradigm of building general-purpose language models (eg, Google's Bert
and OpenAI's GPT-2) in Natural Language Processing (NLP) for text feature extraction, a …

Deepsteal: Advanced model extractions leveraging efficient weight stealing in memories

AS Rakin, MHI Chowdhuryy, F Yao… - 2022 IEEE symposium …, 2022 - ieeexplore.ieee.org
Recent advancements in Deep Neural Networks (DNNs) have enabled widespread
deployment in multiple security-sensitive domains. The need for resource-intensive training …

Adversarial frontier stitching for remote neural network watermarking

E Le Merrer, P Perez, G Trédan - Neural Computing and Applications, 2020 - Springer
The state-of-the-art performance of deep learning models comes at a high cost for
companies and institutions, due to the tedious data collection and the heavy processing …

Securing AI‐based healthcare systems using blockchain technology: A state‐of‐the‐art systematic literature review and future research directions

R Shinde, S Patil, K Kotecha, V Potdar… - Transactions on …, 2024 - Wiley Online Library
Healthcare institutions are progressively integrating artificial intelligence (AI) into their
operations. The extraordinary potential of AI is restricted by insufficient medical data for AI …

Quantifying privacy leakage in graph embedding

V Duddu, A Boutet, V Shejwalkar - MobiQuitous 2020-17th EAI …, 2020 - dl.acm.org
Graph embeddings have been proposed to map graph data to low dimensional space for
downstream processing (eg, node classification or link prediction). With the increasing …

Hermes attack: Steal {DNN} models with lossless inference accuracy

Y Zhu, Y Cheng, H Zhou, Y Lu - 30th USENIX Security Symposium …, 2021 - usenix.org
Deep Neural Network (DNN) models become one of the most valuable enterprise assets
due to their critical roles in all aspects of applications. With the trend of privatization …

What Was Your Prompt? A Remote Keylogging Attack on {AI} Assistants

R Weiss, D Ayzenshteyn, Y Mirsky - 33rd USENIX Security Symposium …, 2024 - usenix.org
AI assistants are becoming an integral part of society, used for asking advice or help in
personal and confidential issues. In this paper, we unveil a novel side-channel that can be …