- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources6
- Resource Type
-
0004000002000000
- More
- Availability
-
60
- Author / Contributor
- Filter by Author / Creator
-
-
Uluagac, Selcuk (6)
-
Akkaya, Kemal (4)
-
Cebe, Mumin (2)
-
Acar, Abbas (1)
-
Al_Duniawi, Mohammed (1)
-
Andrade, Diana Pineda (1)
-
Aris, Ahmet (1)
-
Bautista, Oscar G. (1)
-
Botacin, Marcus (1)
-
Bulut, Eyuphan (1)
-
Chang, Melissa (1)
-
Erdin, Enes (1)
-
Franco, Javier (1)
-
Guo, Qiming (1)
-
Hernandez, Richard (1)
-
Homsi, Soamar (1)
-
Manshaei, Mohammad Hossein (1)
-
Mercan, Suat (1)
-
Nayan, Tushar (1)
-
Perez-Pons, Alexander (1)
-
- Filter by Editor
-
-
Balzarotti, Davide (1)
-
Xu, Wenyuan (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Nayan, Tushar; Guo, Qiming; Al_Duniawi, Mohammed; Botacin, Marcus; Uluagac, Selcuk; Sun, Ruimin (, USENIX)Balzarotti, Davide; Xu, Wenyuan (Ed.)On-device ML is increasingly used in different applications. It brings convenience to offline tasks and avoids sending user-private data through the network. On-device ML models are valuable and may suffer from model extraction attacks from different categories. Existing studies lack a deep understanding of on-device ML model security, which creates a gap between research and practice. This paper provides a systematization approach to classify existing model extraction attacks and defenses based on different threat models. We evaluated well known research projects from existing work with real-world ML models, and discussed their reproducibility, computation complexity, and power consumption. We identified the challenges for research projects in wide adoption in practice. We also provided directions for future research in ML model extraction security.more » « less
-
Bautista, Oscar G.; Manshaei, Mohammad Hossein; Hernandez, Richard; Akkaya, Kemal; Homsi, Soamar; Uluagac, Selcuk (, Journal of Network and Systems Management)
-
Franco, Javier; Acar, Abbas; Aris, Ahmet; Uluagac, Selcuk (, IEEE)
-
Erdin, Enes; Cebe, Mumin; Akkaya, Kemal; Bulut, Eyuphan; Uluagac, Selcuk (, Journal of Network and Computer Applications)
-
Mercan, Suat; Cebe, Mumin; Tekiner, Ege; Akkaya, Kemal; Chang, Melissa; Uluagac, Selcuk (, 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC))
An official website of the United States government

Full Text Available