Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/13969
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGenç, Didem-
dc.contributor.authorÖzuysal, Mustafa-
dc.contributor.authorTomur, Emrah-
dc.date.accessioned2023-11-11T08:54:56Z-
dc.date.available2023-11-11T08:54:56Z-
dc.date.issued2023-
dc.identifier.isbn979-8-3503-1170-9-
dc.identifier.urihttps://doi.org/10.1109/CSR57506.2023.10224959-
dc.identifier.urihttps://hdl.handle.net/11147/13969-
dc.descriptionIEEE International Conference on Cyber Security and Resilience (CSR) -- JUL 31-AUG 02, 2023 -- Venice, ITALYen_US
dc.description.abstractA model extraction attack aims to clone a machine learning target model deployed in the cloud solely by querying the target in a black-box manner. Once a clone is obtained it is possible to launch further attacks with the aid of the local model. In this survey, we analyze existing approaches and present a taxonomic overview of this field based on several important aspects that affect attack efficiency and performance. We present both early works and recently explored directions. We conclude with an analysis of future directions based on recent developments in machine learning methodology.en_US
dc.description.sponsorshipIEEE,IEEE Syst, Man, & Cybernet Soc,LOGOS Res & Innovat,Thales,DARIAH IT,Binare,Citta Metropolitana Venezia,Consorzio Interuniversitario Nazl Informatica,European Cyber Secur Org, Women 4Cyber,MITRE,IEEE SMC Italian Chapter,Ctr Cyber Secur & Int Relat Studies,IEEE TEMS,Cyber 4.0 Cybersecur Competence Ctr,Integrated Miss Grp Secur,DHLAB Univ Roma Treen_US
dc.description.sponsorshipScientific and Technological Research Council of Turkey (TUBITAK) through the 1515 Frontier Research and Development Laboratories Support Program [5169902]en_US
dc.description.sponsorshipThis work was supported in part by The Scientific and Technological Research Council of Turkey (TUBITAK) through the 1515 Frontier Research and Development Laboratories Support Program under Project 5169902.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof2023 IEEE International Conference On Cyber Security and Resilience, Csren_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.titleA Taxonomic Survey of Model Extraction Attacksen_US
dc.typeConference Objecten_US
dc.institutionauthor-
dc.departmentİzmir Institute of Technologyen_US
dc.identifier.startpage200en_US
dc.identifier.endpage205en_US
dc.identifier.wosWOS:001062143200032en_US
dc.identifier.scopus2-s2.0-85171777851en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1109/CSR57506.2023.10224959-
dc.authorscopusid57212107327-
dc.authorscopusid9843586600-
dc.authorscopusid6504092986-
item.grantfulltextnone-
item.openairetypeConference Object-
item.fulltextNo Fulltext-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
crisitem.author.dept03.04. Department of Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

286
checked on May 6, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.