Defending Against Model Stealing Attacks Using Deceptive Perturbations.
Taesung LeeBenjamin EdwardsIan M. MolloyDong SuPublished in: CoRR (2018)
Keyphrases
- experimental data
- computational model
- statistical model
- mathematical model
- probabilistic model
- management system
- countermeasures
- theoretical framework
- database
- hidden markov models
- input data
- objective function
- reinforcement learning
- database systems
- decision making
- search engine
- information security
- formal model
- data sets