Stealing Machine Learning Models via Prediction APIs
暂无分享,去创建一个
Fan Zhang | Michael K. Reiter | Thomas Ristenpart | Ari Juels | Florian Tramèr | A. Juels | Florian Tramèr | Fan Zhang | M. Reiter | T. Ristenpart
[1] Leslie G. Valiant,et al. A theory of the learnable , 1984, STOC '84.
[2] D. Angluin. Queries and Concept Learning , 1988 .
[3] Dana Angluin,et al. Queries and concept learning , 1988, Machine Learning.
[4] George Cybenko,et al. Approximation by superpositions of a sigmoidal function , 1989, Math. Control. Signals Syst..
[5] Kurt Hornik,et al. Multilayer feedforward networks are universal approximators , 1989, Neural Networks.
[6] Alon Itai,et al. Learnability with Respect to Fixed Distributions , 1991, Theor. Comput. Sci..
[7] H. Balsters,et al. Learnability with respect to fixed distributions , 1991 .
[8] Eyal Kushilevitz,et al. Learning decision trees using the Fourier spectrum , 1991, STOC '91.
[9] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[10] Mihir Bellare. A technique for upper bounding the spectral norm with applications to learning , 1992, COLT '92.
[11] Eyal Kushilevitz,et al. Learning Decision Trees Using the Fourier Spectrum , 1993, SIAM J. Comput..
[12] Jeffrey C. Jackson,et al. An efficient membership-query algorithm for learning DNF with respect to the uniform distribution , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[13] Jude W. Shavlik,et al. in Advances in Neural Information Processing , 1996 .
[14] Nader H. Bshouty. Exact Learning Boolean Function via the Monotone Theory , 1995, Inf. Comput..
[15] Joachim Diederich,et al. Survey and critique of techniques for extracting rules from trained artificial neural networks , 1995, Knowl. Based Syst..
[16] Pat Langley,et al. Selection of Relevant Features and Examples in Machine Learning , 1997, Artif. Intell..
[17] Ji Zhu,et al. Kernel Logistic Regression and the Import Vector Machine , 2001, NIPS.
[18] D K Smith,et al. Numerical Optimization , 2001, J. Oper. Res. Soc..
[19] Jude W. Shavlik,et al. Extracting refined rules from knowledge-based neural networks , 2004, Machine Learning.
[20] Jude W. Shavlik,et al. Extracting Refined Rules from Knowledge-Based Neural Networks , 1993, Machine Learning.
[21] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[22] David A. Cohn,et al. Improving generalization with active learning , 1994, Machine Learning.
[23] Christopher Meek,et al. Good Word Attacks on Statistical Spam Filters , 2005, CEAS.
[24] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[25] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[26] Rich Caruana,et al. Model compression , 2006, KDD '06.
[27] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[28] James Newsome,et al. Paragraph: Thwarting Signature Learning by Training Maliciously , 2006, RAID.
[29] Foster J. Provost,et al. Handling Missing Values when Applying Classification Models , 2007, J. Mach. Learn. Res..
[30] Kamalika Chaudhuri,et al. Privacy-preserving logistic regression , 2008, NIPS.
[31] Rebecca N. Wright,et al. A Practical Differentially Private Random Decision Tree Classifier , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[32] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[33] Burr Settles,et al. Active Learning Literature Survey , 2009 .
[34] Marius Kloft,et al. Online Anomaly Detection under Adversarial Impact , 2010, AISTATS.
[35] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[36] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[37] Ling Huang,et al. Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning , 2009, J. Priv. Confidentiality.
[38] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[39] Ling Huang,et al. Query Strategies for Evading Convex-Inducing Classifiers , 2010, J. Mach. Learn. Res..
[40] Yin Yang,et al. Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..
[41] Staal A. Vinterbo,et al. Differentially Private Projected Histograms: Construction and Use for Prediction , 2012, ECML/PKDD.
[42] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[43] Ninghui Li,et al. Membership privacy: a unifying framework for privacy definitions , 2013, CCS.
[44] David Stevens,et al. On the hardness of evading combinations of linear classifiers , 2013, AISec.
[45] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[46] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[47] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[48] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[49] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[50] Giovanni Felici,et al. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers , 2013, Int. J. Secur. Networks.
[51] John Salvatier,et al. Theano: A Python framework for fast computation of mathematical expressions , 2016, ArXiv.
[52] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[53] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.