Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/13969
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Genç, Didem | - |
dc.contributor.author | Özuysal, Mustafa | - |
dc.contributor.author | Tomur, Emrah | - |
dc.date.accessioned | 2023-11-11T08:54:56Z | - |
dc.date.available | 2023-11-11T08:54:56Z | - |
dc.date.issued | 2023 | - |
dc.identifier.isbn | 979-8-3503-1170-9 | - |
dc.identifier.uri | https://doi.org/10.1109/CSR57506.2023.10224959 | - |
dc.identifier.uri | https://hdl.handle.net/11147/13969 | - |
dc.description | IEEE International Conference on Cyber Security and Resilience (CSR) -- JUL 31-AUG 02, 2023 -- Venice, ITALY | en_US |
dc.description.abstract | A model extraction attack aims to clone a machine learning target model deployed in the cloud solely by querying the target in a black-box manner. Once a clone is obtained it is possible to launch further attacks with the aid of the local model. In this survey, we analyze existing approaches and present a taxonomic overview of this field based on several important aspects that affect attack efficiency and performance. We present both early works and recently explored directions. We conclude with an analysis of future directions based on recent developments in machine learning methodology. | en_US |
dc.description.sponsorship | IEEE,IEEE Syst, Man, & Cybernet Soc,LOGOS Res & Innovat,Thales,DARIAH IT,Binare,Citta Metropolitana Venezia,Consorzio Interuniversitario Nazl Informatica,European Cyber Secur Org, Women 4Cyber,MITRE,IEEE SMC Italian Chapter,Ctr Cyber Secur & Int Relat Studies,IEEE TEMS,Cyber 4.0 Cybersecur Competence Ctr,Integrated Miss Grp Secur,DHLAB Univ Roma Tre | en_US |
dc.description.sponsorship | Scientific and Technological Research Council of Turkey (TUBITAK) through the 1515 Frontier Research and Development Laboratories Support Program [5169902] | en_US |
dc.description.sponsorship | This work was supported in part by The Scientific and Technological Research Council of Turkey (TUBITAK) through the 1515 Frontier Research and Development Laboratories Support Program under Project 5169902. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 2023 IEEE International Conference On Cyber Security and Resilience, Csr | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.title | A Taxonomic Survey of Model Extraction Attacks | en_US |
dc.type | Conference Object | en_US |
dc.institutionauthor | … | - |
dc.department | İzmir Institute of Technology | en_US |
dc.identifier.startpage | 200 | en_US |
dc.identifier.endpage | 205 | en_US |
dc.identifier.wos | WOS:001062143200032 | en_US |
dc.identifier.scopus | 2-s2.0-85171777851 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1109/CSR57506.2023.10224959 | - |
dc.authorscopusid | 57212107327 | - |
dc.authorscopusid | 9843586600 | - |
dc.authorscopusid | 6504092986 | - |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
2
checked on Nov 15, 2024
WEB OF SCIENCETM
Citations
1
checked on Nov 9, 2024
Page view(s)
586
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.