Towards data-free model stealing in a hard label setting
Abstract Machine learning models deployed as a service (MLaaS) are susceptible to model
stealing attacks, where an adversary attempts to steal the model within a restricted access …
stealing attacks, where an adversary attempts to steal the model within a restricted access …
Fingerprinting deep neural networks globally via universal adversarial perturbations
In this paper, we propose a novel and practical mechanism which enables the service
provider to verify whether a suspect model is stolen from the victim model via model …
provider to verify whether a suspect model is stolen from the victim model via model …
Decentralized machine learning governance: Overview, opportunities, and challenges
Researchers have started to recognize the necessity for a well-defined ML governance
framework based on the principle of decentralization and comprehensively defining its …
framework based on the principle of decentralization and comprehensively defining its …
Washing the unwashable: On the (im) possibility of fairwashing detection
The use of black-box models (eg, deep neural networks) in high-stakes decision-making
systems, whose internal logic is complex, raises the need for providing explanations about …
systems, whose internal logic is complex, raises the need for providing explanations about …
On monitorability of AI
RV Yampolskiy - AI and Ethics, 2024 - Springer
Artificially intelligent (AI) systems have ushered in a transformative era across various
domains, yet their inherent traits of unpredictability, unexplainability, and uncontrollability …
domains, yet their inherent traits of unpredictability, unexplainability, and uncontrollability …
SoK: Decentralized AI (DeAI)
The centralization of Artificial Intelligence (AI) poses significant challenges, including single
points of failure, inherent biases, data privacy concerns, and scalability issues. These …
points of failure, inherent biases, data privacy concerns, and scalability issues. These …
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks
Early backdoor attacks against machine learning set off an arms race in attack and defence
development. Defences have since appeared demonstrating some ability to detect …
development. Defences have since appeared demonstrating some ability to detect …
[PDF][PDF] Frameworks for ethical data governance in machine learning: Privacy, fairness, and business optimization
The rapid growth of machine learning (ML) technologies has transformed industries by
enabling data-driven decisionmaking, yet it has also raised critical ethical concerns …
enabling data-driven decisionmaking, yet it has also raised critical ethical concerns …
SoK: Dataset Copyright Auditing in Machine Learning Systems
As the implementation of machine learning (ML) systems becomes more widespread,
especially with the introduction of larger ML models, we perceive a spring demand for …
especially with the introduction of larger ML models, we perceive a spring demand for …
Ensuring Trustworthy Machine Learning: Ethical Foundations, Robust Algorithms, and Responsible Applications
UA Usmani, AY Usmani… - … Conference on Computing …, 2023 - ieeexplore.ieee.org
Intrusion detection, a pivotal facet of securing digital environments, intersects with the
proliferation of machine learning (ML) technologies, which have driven transformative …
proliferation of machine learning (ML) technologies, which have driven transformative …